Lucene search

K
cveAppleCVE-2011-3216
HistoryOct 14, 2011 - 10:55 a.m.

CVE-2011-3216

2011-10-1410:55:08
CWE-264
apple
web.nvd.nist.gov
26
cve-2011-3216
apple mac os x
kernel
permissions
sticky bit
bypass
unlink system call
nvd

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

AI Score

7.5

Confidence

High

EPSS

0

Percentile

5.1%

The kernel in Apple Mac OS X before 10.7.2 does not properly implement the sticky bit for directories, which might allow local users to bypass intended permissions and delete files via an unlink system call.

Affected configurations

Nvd
Node
applemac_os_xRange10.7.1
OR
applemac_os_xMatch10.0
OR
applemac_os_xMatch10.0.0
OR
applemac_os_xMatch10.0.1
OR
applemac_os_xMatch10.0.2
OR
applemac_os_xMatch10.0.3
OR
applemac_os_xMatch10.0.4
OR
applemac_os_xMatch10.1
OR
applemac_os_xMatch10.1.0
OR
applemac_os_xMatch10.1.1
OR
applemac_os_xMatch10.1.2
OR
applemac_os_xMatch10.1.3
OR
applemac_os_xMatch10.1.4
OR
applemac_os_xMatch10.1.5
OR
applemac_os_xMatch10.2
OR
applemac_os_xMatch10.2.0
OR
applemac_os_xMatch10.2.1
OR
applemac_os_xMatch10.2.2
OR
applemac_os_xMatch10.2.3
OR
applemac_os_xMatch10.2.4
OR
applemac_os_xMatch10.2.5
OR
applemac_os_xMatch10.2.6
OR
applemac_os_xMatch10.2.7
OR
applemac_os_xMatch10.2.8
OR
applemac_os_xMatch10.3
OR
applemac_os_xMatch10.3.0
OR
applemac_os_xMatch10.3.1
OR
applemac_os_xMatch10.3.2
OR
applemac_os_xMatch10.3.3
OR
applemac_os_xMatch10.3.4
OR
applemac_os_xMatch10.3.5
OR
applemac_os_xMatch10.3.6
OR
applemac_os_xMatch10.3.7
OR
applemac_os_xMatch10.3.8
OR
applemac_os_xMatch10.3.9
OR
applemac_os_xMatch10.4
OR
applemac_os_xMatch10.4.0
OR
applemac_os_xMatch10.4.1
OR
applemac_os_xMatch10.4.2
OR
applemac_os_xMatch10.4.3
OR
applemac_os_xMatch10.4.4
OR
applemac_os_xMatch10.4.5
OR
applemac_os_xMatch10.4.6
OR
applemac_os_xMatch10.4.7
OR
applemac_os_xMatch10.4.8
OR
applemac_os_xMatch10.4.9
OR
applemac_os_xMatch10.4.10
OR
applemac_os_xMatch10.4.11
OR
applemac_os_xMatch10.5
OR
applemac_os_xMatch10.5.0
OR
applemac_os_xMatch10.5.1
OR
applemac_os_xMatch10.5.2
OR
applemac_os_xMatch10.5.3
OR
applemac_os_xMatch10.5.4
OR
applemac_os_xMatch10.5.5
OR
applemac_os_xMatch10.5.6
OR
applemac_os_xMatch10.5.7
OR
applemac_os_xMatch10.5.8
OR
applemac_os_xMatch10.6.0
OR
applemac_os_xMatch10.6.1
OR
applemac_os_xMatch10.6.2
OR
applemac_os_xMatch10.6.3
OR
applemac_os_xMatch10.6.4
OR
applemac_os_xMatch10.6.5
OR
applemac_os_xMatch10.6.6
OR
applemac_os_xMatch10.6.7
OR
applemac_os_xMatch10.6.8
OR
applemac_os_xMatch10.7.0
OR
applemac_os_x_serverRange10.7.1
OR
applemac_os_x_serverMatch10.0
OR
applemac_os_x_serverMatch10.0.0
OR
applemac_os_x_serverMatch10.0.1
OR
applemac_os_x_serverMatch10.0.2
OR
applemac_os_x_serverMatch10.0.3
OR
applemac_os_x_serverMatch10.0.4
OR
applemac_os_x_serverMatch10.1
OR
applemac_os_x_serverMatch10.1.0
OR
applemac_os_x_serverMatch10.1.1
OR
applemac_os_x_serverMatch10.1.2
OR
applemac_os_x_serverMatch10.1.3
OR
applemac_os_x_serverMatch10.1.4
OR
applemac_os_x_serverMatch10.1.5
OR
applemac_os_x_serverMatch10.2
OR
applemac_os_x_serverMatch10.2.0
OR
applemac_os_x_serverMatch10.2.1
OR
applemac_os_x_serverMatch10.2.2
OR
applemac_os_x_serverMatch10.2.3
OR
applemac_os_x_serverMatch10.2.4
OR
applemac_os_x_serverMatch10.2.5
OR
applemac_os_x_serverMatch10.2.6
OR
applemac_os_x_serverMatch10.2.7
OR
applemac_os_x_serverMatch10.2.8
OR
applemac_os_x_serverMatch10.3
OR
applemac_os_x_serverMatch10.3.0
OR
applemac_os_x_serverMatch10.3.1
OR
applemac_os_x_serverMatch10.3.2
OR
applemac_os_x_serverMatch10.3.3
OR
applemac_os_x_serverMatch10.3.4
OR
applemac_os_x_serverMatch10.3.5
OR
applemac_os_x_serverMatch10.3.6
OR
applemac_os_x_serverMatch10.3.7
OR
applemac_os_x_serverMatch10.3.8
OR
applemac_os_x_serverMatch10.3.9
OR
applemac_os_x_serverMatch10.4
OR
applemac_os_x_serverMatch10.4.0
OR
applemac_os_x_serverMatch10.4.1
OR
applemac_os_x_serverMatch10.4.2
OR
applemac_os_x_serverMatch10.4.3
OR
applemac_os_x_serverMatch10.4.4
OR
applemac_os_x_serverMatch10.4.5
OR
applemac_os_x_serverMatch10.4.6
OR
applemac_os_x_serverMatch10.4.7
OR
applemac_os_x_serverMatch10.4.8
OR
applemac_os_x_serverMatch10.4.9
OR
applemac_os_x_serverMatch10.4.10
OR
applemac_os_x_serverMatch10.4.11
OR
applemac_os_x_serverMatch10.5
OR
applemac_os_x_serverMatch10.5.0
OR
applemac_os_x_serverMatch10.5.1
OR
applemac_os_x_serverMatch10.5.2
OR
applemac_os_x_serverMatch10.5.3
OR
applemac_os_x_serverMatch10.5.4
OR
applemac_os_x_serverMatch10.5.5
OR
applemac_os_x_serverMatch10.5.6
OR
applemac_os_x_serverMatch10.5.7
OR
applemac_os_x_serverMatch10.5.8
OR
applemac_os_x_serverMatch10.6.0
OR
applemac_os_x_serverMatch10.6.1
OR
applemac_os_x_serverMatch10.6.2
OR
applemac_os_x_serverMatch10.6.3
OR
applemac_os_x_serverMatch10.6.4
OR
applemac_os_x_serverMatch10.6.5
OR
applemac_os_x_serverMatch10.6.6
OR
applemac_os_x_serverMatch10.6.7
OR
applemac_os_x_serverMatch10.6.8
OR
applemac_os_x_serverMatch10.7.0
VendorProductVersionCPE
applemac_os_x*cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
applemac_os_x10.0cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*
applemac_os_x10.0.0cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*
applemac_os_x10.0.1cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
applemac_os_x10.0.2cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
applemac_os_x10.0.3cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
applemac_os_x10.0.4cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
applemac_os_x10.1cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
applemac_os_x10.1.0cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*
applemac_os_x10.1.1cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
Rows per page:
1-10 of 1361

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:L/AC:L/Au:N/C:N/I:P/A:N

AI Score

7.5

Confidence

High

EPSS

0

Percentile

5.1%