{ "id": "CVE-2016-8661", "sourceIdentifier": "office@obdev.at", "published": "2016-11-15T15:59:00.180", "lastModified": "2023-11-07T02:36:25.947", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the \"OSMalloc\" and \"copyin\" kernel API calls." }, { "lang": "es", "value": "Little Snitch versi\u00f3n 3.0 hasta la versi\u00f3n 3.6.1 sufre de una vulnerabilidad de desbordamiento de b\u00fafer que podr\u00eda ser explotada localmente lo que podr\u00eda conducir a una escalada de privilegios (EoP) y un acceso no autorizado al sistema operativo. El desbordamiento de b\u00fafer est\u00e1 relacionado con una comprobaci\u00f3n insuficiente de los par\u00e1metros para las llamadas de la API del kernel \"OSMalloc\" y \"copyin\"." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.5, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 7.2 }, "baseSeverity": "HIGH", "exploitabilityScore": 3.9, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B3104B3C-7FB4-45D8-8B94-38C64DB5358E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "83C15999-BD32-4576-976A-2B516A159BEC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "8B790676-4683-4C37-8D6C-A7422F29D5B8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FA526073-1289-4A26-8D06-2F33318AD940" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C3AAF8D9-02A7-4AE4-A386-6DDC0F813163" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "1D210C3B-3A48-4ACF-A957-253F15962EE5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "35027020-5BFD-45EA-9371-7342B3CA9AAF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFCCA6D8-420C-438A-806D-E3B909B12701" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8B0447E-6A54-42ED-81A9-B4B16EF2C05B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "08087DF0-3980-4F59-A759-DD5D710CB5FD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "91998865-31C0-4F6F-A4E9-14F3C4727C5F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "76108E38-65E9-4918-BB90-DCD6063E64F9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "3F625187-402F-461E-A760-EB967DA79E89" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1A00C225-33C2-4F4A-AAF8-131A6FC8CC52" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "918A02B3-1F03-478E-990B-EDE245F69495" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F518B2CE-C946-47EF-81BF-C3DF3A2CF9B6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "7D8D953E-4FC7-4F31-8DB5-DC2C5115CC92" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "34A22CFD-D6A7-4EAE-A459-69453ADEB703" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "239823E3-A508-4B67-8A5F-7DCFCCBD1C24" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "7BACEFA0-52CD-45C7-B0A0-A9B4A1EA9B9E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:obdev:little_snitch:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0CA536C-001F-438F-8078-C6A4F51A6C15" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/bid/94352", "source": "office@obdev.at" }, { "url": "https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one", "source": "office@obdev.at" } ] }