CVE-2006-4392
Mach kernel - Privilege Escalation
Title source: llmDescription
The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) OpenStep before 4.2, allows local users to gain privileges via a parent process that forces an exception in a setuid child and uses Mach exception ports to modify the child's thread context and task address space in a way that causes the child to call a parent-controlled function.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Kevin Finisterre · perllocalosx
https://www.exploit-db.com/exploits/2464
References (12)
Scores
EPSS
0.0101
EPSS Percentile
77.2%
Details
Status
published
Products (9)
apple/mac_os_x
10.4
apple/mac_os_x
10.4.1
apple/mac_os_x
10.4.2
apple/mac_os_x
10.4.3
apple/mac_os_x
10.4.4
apple/mac_os_x
10.4.5
apple/mac_os_x
10.4.6
apple/mac_os_x
10.4.7
next/openstep
4.1
Published
Oct 03, 2006
Tracked Since
Feb 18, 2026