Research > Zero-Day Tracker > 20111110
Apple OS X Sandbox Predefined Profile Bypass Vulnerability
Mac OS X 10.7.2, 10.6.x, 10.5.x and earlier
Apple Mac OS X contains a vulnerability when restricting access to application uses a pre-defined sandbox profile (Seatbelt). Successful exploitation may allow an attacker to perform certain functions outside of the sandbox, bypassing intended sandbox restrictions.
Note: According to CORE's advisory, Apple does not believe this issue has any security implications and they intend to update their documentation to reflect the sandbox profile's functionality.
This vulnerability could allow an attacker to gain access to otherwise restricted components.
No mitigation has been provided.
15909 - Apple Mac OS X Security Update 2012-001 and OS X 10.7.3 Update
11.10.2011 - Public Information Released
2.1.2012 - Apple released OS X 10.7.3, which fixed CVE-2011-1516
Copyright ©1998-2011 eEye Digital Security
Permission is hereby granted for the redistribution of this alert electronically. It is not to be edited in any way without express consent of eEye. If you wish to reprint the whole or any part of this alert in any other medium excluding electronic medium, please email alert@eEye.com for permission.
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk.