var-201510-0192
Vulnerability from variot
Apple Mac EFI before 2015-002, as used in OS X before 10.11.1 and other products, mishandles arguments, which allows attackers to reach "unused" functions via unspecified vectors. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlBy the attacker, " not being used " Function may be reached. of the United States for Mac computers. An attacker could use this vulnerability to perform unauthorized operations in the context of an affected system. Apple Mac EFI is one of the firmware upgrade interfaces. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2015-10-21-6 Mac EFI Security Update 2015-002
Mac EFI Security Update 2015-002 is now available and addresses the following:
EFI Available for: OS X Mavericks v10.9.5 Impact: An attacker can exercise unused EFI functions Description: An issue existed with EFI argument handling. This was addressed by removing the affected functions. CVE-ID CVE-2015-7035 : Corey Kallenberg, Xeno Kovah, John Butterworth, and Sam Cornwell of The MITRE Corporation, coordinated via CERT
Installation note:
Mac EFI Security Update 2015-002 may be obtained from the Mac App Store.
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJWJ9rpAAoJEBcWfLTuOo7tYI4QAKGoNIBxSQDwnZZU2PcR82yu KvLVgrowQqNMRzxygIK6yyxXPEAI3V+W4ZMWVBh60ZvHfB/AS9c8cUntbpgtvtKO ttO6ngmpH6bKRfCtoT99vbEowdlq4GmduCOmRBH5P4fmKbLxJGyLZIgStmMagYqa /bL8w8c+a7xbGwdsVGLQDFcLCplCGyhJxDRDRo1e8HZOdBVpxhKZ0boQYX7T8oat rS7daZIEZekwVqloI+5PHEmGeZo5C5sMTYA3qiCbyPvg2MSeVsQeY/t3YCP7iP7p eShq03cwzZ7UqVys6f1EPUMRg7fz6qOYP7n7rTrdKUJQ3+6N0ktSuKB3ApetzSzN 7BjtyEQnUYmwMAyI51jxsi+lir7pKJcG3X7Wtc4Vf6XKsySQH5LI7GES1O39SOpD bq0lavypGewF9ipMO9nrizc/OXnaUlXKACgJ43OcLuYYfnIOD+c3qaWsQPxfyBZ/ ks4AjbJRp/kt2E7RP7OhvTY116yXsDRjsf/ndd56ZktRiwrLtFG5EsbSlO2QnQ49 +ZaqU9rRW7rUUyRFwCjxSjQxDiWvYuufsLtqZCr1QlHsPG7+XztnFy4FOiEDvCzy 8tUPSVNrm4VGLRooBIoPsh8rmx1AHnKPdjFYl9CS3/lVk0pvkrctbSHekaIu6E1x fppz1h8xtXHMHIROMi76 =Hb9X -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201510-0192", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.11.0" }, { "model": "mac efi", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "2015-002" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.10.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.11" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.9.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.11.0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005539" }, { "db": "CNNVD", "id": "CNNVD-201510-508" }, { "db": "NVD", "id": "CVE-2015-7035" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_efi", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005539" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Pedro Vilaca", "sources": [ { "db": "CNNVD", "id": "CNNVD-201506-086" } ], "trust": 0.6 }, "cve": "CVE-2015-7035", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2015-7035", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-84996", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-7035", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2015-7035", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201510-508", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-84996", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-84996" }, { "db": "JVNDB", "id": "JVNDB-2015-005539" }, { "db": "CNNVD", "id": "CNNVD-201510-508" }, { "db": "NVD", "id": "CVE-2015-7035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Mac EFI before 2015-002, as used in OS X before 10.11.1 and other products, mishandles arguments, which allows attackers to reach \"unused\" functions via unspecified vectors. Supplementary information : CWE Vulnerability type by CWE-17: Code ( code ) Has been identified. http://cwe.mitre.org/data/definitions/17.htmlBy the attacker, \" not being used \" Function may be reached. of the United States for Mac computers. An attacker could use this vulnerability to perform unauthorized operations in the context of an affected system. Apple Mac EFI is one of the firmware upgrade interfaces. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2015-10-21-6 Mac EFI Security Update 2015-002\n\nMac EFI Security Update 2015-002 is now available and addresses the\nfollowing:\n\nEFI\nAvailable for: OS X Mavericks v10.9.5\nImpact: An attacker can exercise unused EFI functions\nDescription: An issue existed with EFI argument handling. This was\naddressed by removing the affected functions. \nCVE-ID\nCVE-2015-7035 : Corey Kallenberg, Xeno Kovah, John Butterworth, and\nSam Cornwell of The MITRE Corporation, coordinated via CERT\n\nInstallation note:\n\nMac EFI Security Update 2015-002 may be obtained from\nthe Mac App Store. \n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\nfppz1h8xtXHMHIROMi76\n=Hb9X\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2015-7035" }, { "db": "JVNDB", "id": "JVNDB-2015-005539" }, { "db": "CNNVD", "id": "CNNVD-201506-086" }, { "db": "BID", "id": "74971" }, { "db": "VULHUB", "id": "VHN-84996" }, { "db": "PACKETSTORM", "id": "134057" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-7035", "trust": 2.9 }, { "db": "BID", "id": "74971", "trust": 2.0 }, { "db": "SECTRACK", "id": "1033921", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU92655282", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2015-005539", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201510-508", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201506-086", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "134057", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-84996", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84996" }, { "db": "BID", "id": "74971" }, { "db": "JVNDB", "id": "JVNDB-2015-005539" }, { "db": "PACKETSTORM", "id": "134057" }, { "db": "CNNVD", "id": "CNNVD-201510-508" }, { "db": "CNNVD", "id": "CNNVD-201506-086" }, { "db": "NVD", "id": "CVE-2015-7035" } ] }, "id": "VAR-201510-0192", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-84996" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:16:23.118000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Apple security updates", "trust": 0.8, "url": "https://support.apple.com/en-us/HT201222" }, { "title": "APPLE-SA-2015-10-21-6 Mac EFI Security Update 2015-002", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00007.html" }, { "title": "APPLE-SA-2015-10-21-4 OS X El Capitan 10.11.1 and Security Update 2015-007", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2015/Oct/msg00005.html" }, { "title": "HT205375", "trust": 0.8, "url": "https://support.apple.com/en-us/HT205375" }, { "title": "HT205317", "trust": 0.8, "url": "https://support.apple.com/en-us/HT205317" }, { "title": "HT205375", "trust": 0.8, "url": "http://support.apple.com/ja-jp/HT205375" }, { "title": "HT205317", "trust": 0.8, "url": "http://support.apple.com/ja-jp/HT205317" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005539" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-17", "trust": 1.1 }, { "problemtype": "CWE-Other", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84996" }, { "db": "JVNDB", "id": "JVNDB-2015-005539" }, { "db": "NVD", "id": "CVE-2015-7035" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2015/oct/msg00005.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2015/oct/msg00007.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/74971" }, { "trust": 1.7, "url": "https://support.apple.com/ht205317" }, { "trust": 1.7, "url": "https://support.apple.com/ht205375" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1033921" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7035" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu92655282/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7035" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7035" } ], "sources": [ { "db": "VULHUB", "id": "VHN-84996" }, { "db": "BID", "id": "74971" }, { "db": "JVNDB", "id": "JVNDB-2015-005539" }, { "db": "PACKETSTORM", "id": "134057" }, { "db": "CNNVD", "id": "CNNVD-201510-508" }, { "db": "CNNVD", "id": "CNNVD-201506-086" }, { "db": "NVD", "id": "CVE-2015-7035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-84996" }, { "db": "BID", "id": "74971" }, { "db": "JVNDB", "id": "JVNDB-2015-005539" }, { "db": "PACKETSTORM", "id": "134057" }, { "db": "CNNVD", "id": "CNNVD-201510-508" }, { "db": "CNNVD", "id": "CNNVD-201506-086" }, { "db": "NVD", "id": "CVE-2015-7035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-10-23T00:00:00", "db": "VULHUB", "id": "VHN-84996" }, { "date": "2015-05-29T00:00:00", "db": "BID", "id": "74971" }, { "date": "2015-10-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005539" }, { "date": "2015-10-21T19:44:44", "db": "PACKETSTORM", "id": "134057" }, { "date": "2015-10-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-508" }, { "date": "2015-05-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-086" }, { "date": "2015-10-23T10:59:17.223000", "db": "NVD", "id": "CVE-2015-7035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-24T00:00:00", "db": "VULHUB", "id": "VHN-84996" }, { "date": "2015-11-03T20:08:00", "db": "BID", "id": "74971" }, { "date": "2015-10-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005539" }, { "date": "2015-10-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201510-508" }, { "date": "2015-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-201506-086" }, { "date": "2024-11-21T02:36:05.220000", "db": "NVD", "id": "CVE-2015-7035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-508" }, { "db": "CNNVD", "id": "CNNVD-201506-086" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple OS X Used in products such as Mac EFI Vulnerability reached in unused function", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005539" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201510-508" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.