Description
Apple Mac EFI before 2015-001, as used in OS X before 10.10.4 and other products, does not properly set refresh rates for DDR3 RAM, which might make it easier for remote attackers to conduct row-hammer attacks, and consequently gain privileges or cause a denial of service (memory corruption), by triggering certain patterns of access to memory locations.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Google Security Research · textlocallinux_x86-64
https://www.exploit-db.com/exploits/36311
References (8)
Core 8
Core References
Vendor Advisory vendor-advisory
x_refsource_apple
http://lists.apple.com/archives/security-announce/2015/Jun/msg00003.html
Various Sources x_refsource_misc
http://googleprojectzero.blogspot.com/2015/03/exploiting-dram-rowhammer-bug-to-gain.html
Patch, Vendor Advisory vendor-advisory
x_refsource_apple
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1032755
Vendor Advisory x_refsource_confirm
http://support.apple.com/kb/HT204942
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/75495
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1032444
Vendor Advisory x_refsource_confirm
http://support.apple.com/kb/HT204934
Scores
EPSS
0.3114
EPSS Percentile
96.8%
Details
CWE
CWE-254
Status
published
Products (1)
apple/mac_os_x
< 10.10.3
Published
Jul 03, 2015
Tracked Since
Feb 18, 2026