CVE-2006-4392

Mach kernel - Privilege Escalation

Title source: llm

Description

The Mach kernel, as used in operating systems including (1) Mac OS X 10.4 through 10.4.7 and (2) OpenStep before 4.2, allows local users to gain privileges via a parent process that forces an exception in a setuid child and uses Mach exception ports to modify the child's thread context and task address space in a way that causes the child to call a parent-controlled function.

Exploits (2)

exploitdb WORKING POC VERIFIED
by xmath · clocalosx
https://www.exploit-db.com/exploits/2463
exploitdb WORKING POC VERIFIED
by Kevin Finisterre · perllocalosx
https://www.exploit-db.com/exploits/2464

Scores

EPSS 0.0101
EPSS Percentile 77.2%

Details

Status published
Products (9)
apple/mac_os_x 10.4
apple/mac_os_x 10.4.1
apple/mac_os_x 10.4.2
apple/mac_os_x 10.4.3
apple/mac_os_x 10.4.4
apple/mac_os_x 10.4.5
apple/mac_os_x 10.4.6
apple/mac_os_x 10.4.7
next/openstep 4.1
Published Oct 03, 2006
Tracked Since Feb 18, 2026