Advisory Details

June 26th, 2018

Apple macOS Dock Service DSSetProcessLabel Uninitialized Pointer Privilege Escalation Vulnerability

ZDI-18-589
ZDI-CAN-6121

CVE ID CVE-2018-4196
CVSS SCORE 4.4, AV:L/AC:M/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Apple
AFFECTED PRODUCTS macOS
VULNERABILITY DETAILS


This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the handling of Mach messages to the Dock. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code within the context of the Dock process.

ADDITIONAL DETAILS Apple has issued an update to correct this vulnerability. More details can be found at:
https://support.apple.com/en-ca/HT208849
DISCLOSURE TIMELINE
  • 2018-04-25 - Vulnerability reported to vendor
  • 2018-06-26 - Coordinated public release of advisory
  • 2018-06-26 - Advisory Updated
CREDIT WanderingGlitch of Trend Micro Zero Day Initiative
BACK TO ADVISORIES