The kernel in Apple Mac OS X before 10.7.2 does not properly prevent FireWire DMA in the absence of a login, which allows physically proximate attackers to bypass intended access restrictions and discover a password by making a DMA request in the (1) loginwindow, (2) boot, or (3) shutdown state.
No CVSS v3.1
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
AV:L/AC:L/Au:N/C:P/I:N/A:N
Vendors | Products |
---|---|
Apple |
|
Configuration 1 [-]
|
References
Link | Resource |
---|---|
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html | Vendor Advisory |
http://support.apple.com/kb/HT5002 | Vendor Advisory |
http://www.securityfocus.com/bid/50085 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: apple
Published: 2011-10-14T10:00:00
Updated: 2012-01-14T10:00:00
Reserved: 2011-08-19T00:00:00
Link: CVE-2011-3215
JSON object: View
NVD Information
Status : Modified
Published: 2011-10-14T10:55:08.510
Modified: 2012-01-14T03:55:33.697
Link: CVE-2011-3215
JSON object: View
Redhat Information
No data.
CWE