Kaspersky ID:
KLA10540
Detect Date:
04/10/2015
Updated:
09/26/2023

Description

Multiple serious vulnerabilities have been found in Apple OS X. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, bypass security restrictions, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. Unsafe password storage can be exploited remotely via files manipulation;
  2. Unencrypted requests sending can be exploited remotely via network manipulations;
  3. Improper signatures validation can be exploited locally via a specially designed bundle;
  4. Buffer overdlow can be exploited locally via a specially designed Uniform Type Identifier and other unspecified vectors;
  5. Unknown vulnerabilities can be exploited locally via a specially designed .SGI file, localized strings or localization data;
  6. Unknown vulnerabilities can be exploited locally via an unspecified vectors related to NVIDIA graphics, Apple Type Services, kernel and Hypervisor;
  7. Use-adter-free vulnerability cab ve exloited remotely via mutex manipulations.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Related products

CVE list

  • CVE-2015-1140
    high
  • CVE-2015-1139
    high
  • CVE-2015-1145
    warning
  • CVE-2015-1148
    critical
  • CVE-2015-1147
    critical
  • CVE-2015-1146
    warning
  • CVE-2015-1138
    warning
  • CVE-2015-1144
    high
  • CVE-2015-1143
    high
  • CVE-2015-1142
    warning
  • CVE-2015-1141
    warning
  • CVE-2015-1135
    high
  • CVE-2015-1133
    high
  • CVE-2015-1136
    high
  • CVE-2015-1134
    high
  • CVE-2015-1137
    high

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.