CVE-2006-4392 (CNNVD-200610-002)

HIGH 有利用代码
中文标题:
Apple Mac OS Kernel Mach 组件任意文件执行漏洞
英文标题:
The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) Ope...
CVSS分数: 7.2
发布时间: 2006-10-02 20:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v5
漏洞描述
中文描述:

Apple Mac OS X是苹果家族机器所使用的操作系统。 Kernel Mach中存在漏洞可以使恶意用户以高权限执行任意命令。

英文描述:

The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) OpenStep before 4.2, allows local users to gain privileges via a parent process that forces an exception in a setuid child and uses Mach exception ports to modify the child's thread context and task address space in a way that causes the child to call a parent-controlled function.

CWE类型:
(暂无数据)
标签:
local osx xmath Kevin Finisterre
受影响产品
厂商 产品 版本 版本范围 平台 CPE
apple mac_os_x 10.4 - - cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
apple mac_os_x 10.4.1 - - cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
apple mac_os_x 10.4.2 - - cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
apple mac_os_x 10.4.3 - - cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
apple mac_os_x 10.4.4 - - cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
apple mac_os_x 10.4.5 - - cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
apple mac_os_x 10.4.6 - - cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
apple mac_os_x 10.4.7 - - cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
next openstep 4.1 - - cpe:2.3:o:next:openstep:4.1:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
20271 vdb-entry
cve.org
访问
1016954 vdb-entry
cve.org
访问
22187 third-party-advisory
cve.org
访问
ADV-2006-3852 vdb-entry
cve.org
访问
APPLE-SA-2006-09-29 vendor-advisory
cve.org
访问
20060929 Matasano Advisory: MacOS X Mach Exception Server Privilege Escalation mailing-list
cve.org
访问
VU#838404 third-party-advisory
cve.org
访问
29269 vdb-entry
cve.org
访问
TA06-275A third-party-advisory
cve.org
访问
1663 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
macos-kernel-code-execution(29281) vdb-entry
cve.org
访问
ExploitDB EDB-2463 EXPLOIT
exploitdb
访问
Download Exploit EDB-2463 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2006-4392 ADVISORY
cve.org
访问
ExploitDB EDB-2464 EXPLOIT
exploitdb
访问
Download Exploit EDB-2464 EXPLOIT
exploitdb
访问
CVSS评分详情
7.2
HIGH
CVSS向量: AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2006-10-02 20:00:00
修改时间:
2024-08-07 19:06:07
创建时间:
2025-11-11 15:32:36
更新时间:
2025-11-11 16:20:43
利用信息
此漏洞有可利用代码!
利用代码数量: 2
利用来源:
未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2006-4392 2025-11-11 15:17:44 2025-11-11 07:32:36
NVD nvd_CVE-2006-4392 2025-11-11 14:51:51 2025-11-11 07:41:22
CNNVD cnnvd_CNNVD-200610-002 2025-11-11 15:08:53 2025-11-11 07:49:10
EXPLOITDB exploitdb_EDB-2463 2025-11-11 15:05:29 2025-11-11 08:20:42
EXPLOITDB exploitdb_EDB-2464 2025-11-11 15:05:29 2025-11-11 08:20:43
版本与语言
当前版本: v5
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5 EXPLOITDB
2025-11-11 16:20:43
references_count: 15 → 17; tags_count: 3 → 4
查看详细变更
  • references_count: 15 -> 17
  • tags_count: 3 -> 4
v4 EXPLOITDB
2025-11-11 16:20:42
references_count: 12 → 15; tags_count: 0 → 3; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 12 -> 15
  • tags_count: 0 -> 3
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:10
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200610-002; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200610-002
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:22
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.2; cvss_vector: NOT_EXTRACTED → AV:L/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 9; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.2
  • cvss_vector: NOT_EXTRACTED -> AV:L/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 9
  • data_sources: ['cve'] -> ['cve', 'nvd']