4.4
CVE-2011-0185
- EPSS 0.06%
- Veröffentlicht 14.10.2011 10:55:07
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle product-security@apple.com
- Teams Watchlist Login
- Unerledigt Login
Format string vulnerability in the debug-logging feature in Application Firewall in Apple Mac OS X before 10.7.2 allows local users to gain privileges via a crafted name of an executable file.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Apple ≫ macOS X Server Version <= 10.7.1
Apple ≫ macOS X Server Version10.7.0
Apple ≫ macOS X Server Version10.6.0
Apple ≫ macOS X Server Version10.6.1
Apple ≫ macOS X Server Version10.6.2
Apple ≫ macOS X Server Version10.6.3
Apple ≫ macOS X Server Version10.6.4
Apple ≫ macOS X Server Version10.6.5
Apple ≫ macOS X Server Version10.6.6
Apple ≫ macOS X Server Version10.6.7
Apple ≫ macOS X Server Version10.6.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.152 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4.4 | 3.4 | 6.4 |
AV:L/AC:M/Au:N/C:P/I:P/A:P
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.