Apple Remote Desktop Full Screen Sleep Mode Flaw Lets Local Users Bypass Security Restrictions
|
SecurityTracker Alert ID: 1034187 |
SecurityTracker URL: http://securitytracker.com/id/1034187
|
CVE Reference:
CVE-2013-5229
(Links to External Site)
|
Date: Nov 20 2015
|
Impact:
User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in Apple Remote Desktop. A local user can bypass security restrictions.
A physically local user can bypass security controls on the target system when Apple Remote Desktop is in full screen mode with an active remote connection and the system recovers from sleep mode due to a flaw in dialog box text processing.
The original advisory is available at:
http://jvn.jp/en/jp/JVN56210048/index.html
Masaki Katayama of Cyber Risks Laboratory Naviplus CO, Ltd. reported this vulnerability (via JPCERT/CC IPA).
|
Impact:
A local user can bypass security controls on the target system.
|
Solution:
The vendor silently issued a fix (3.7) [in October 2013].
The fix is also included in OS X 10.9.
|
Vendor URL: www.apple.com/ (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: UNIX (macOS/OS X)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|