Vulnerabilites related to Objective Development Software GmbH - Little Snitch
CVE-2018-10470 (GCVE-0-2018-10470)
Vulnerability from cvelistv5
Published
2018-06-12 17:00
Modified
2024-09-16 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Summary
Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Objective Development Software GmbH | Little Snitch |
Version: 4.0 - 4.0.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:39:07.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://obdev.at/cve/2018-10470-8FRWkW4oH8.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Little Snitch", "vendor": "Objective Development Software GmbH", "versions": [ { "status": "affected", "version": "4.0 - 4.0.6" } ] } ], "datePublic": "2018-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347: Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-12T17:57:01", "orgId": "e0cebea7-a708-4bfe-81c1-855d35eb4544", "shortName": "obdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://obdev.at/cve/2018-10470-8FRWkW4oH8.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "DATE_PUBLIC": "2018-06-12T00:00:00", "ID": "CVE-2018-10470", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Little Snitch", "version": { "version_data": [ { "version_value": "4.0 - 4.0.6" } ] } } ] }, "vendor_name": "Objective Development Software GmbH" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-347: Improper Verification of Cryptographic Signature" } ] } ] }, "references": { "reference_data": [ { "name": "https://obdev.at/cve/2018-10470-8FRWkW4oH8.html", "refsource": "CONFIRM", "url": "https://obdev.at/cve/2018-10470-8FRWkW4oH8.html" }, { "name": "https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/", "refsource": "MISC", "url": "https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0cebea7-a708-4bfe-81c1-855d35eb4544", "assignerShortName": "obdev", "cveId": "CVE-2018-10470", "datePublished": "2018-06-12T17:00:00Z", "dateReserved": "2018-04-27T00:00:00", "dateUpdated": "2024-09-16T21:03:03.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-2675 (GCVE-0-2017-2675)
Vulnerability from cvelistv5
Published
2017-04-06 15:00
Modified
2024-08-05 14:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- unspecified
Summary
Little Snitch version 3.0 through 3.7.3 suffer from a local privilege escalation vulnerability in the installer part. The vulnerability is related to the installation of the configuration file "at.obdev.littlesnitchd.plist" which gets installed to /Library/LaunchDaemons.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Objective Development Software GmbH | Little Snitch |
Version: 3.0 - 3.7.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:02:07.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.obdev.at/products/littlesnitch/releasenotes.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/patrickwardle/status/849076615170711552" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Little Snitch", "vendor": "Objective Development Software GmbH", "versions": [ { "status": "affected", "version": "3.0 - 3.7.3" } ] } ], "datePublic": "2017-04-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Little Snitch version 3.0 through 3.7.3 suffer from a local privilege escalation vulnerability in the installer part. The vulnerability is related to the installation of the configuration file \"at.obdev.littlesnitchd.plist\" which gets installed to /Library/LaunchDaemons." } ], "problemTypes": [ { "descriptions": [ { "description": "unspecified", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-04-11T19:57:01", "orgId": "e0cebea7-a708-4bfe-81c1-855d35eb4544", "shortName": "obdev" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.obdev.at/products/littlesnitch/releasenotes.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/patrickwardle/status/849076615170711552" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-2675", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Little Snitch", "version": { "version_data": [ { "version_value": "3.0 - 3.7.3" } ] } } ] }, "vendor_name": "Objective Development Software GmbH" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Little Snitch version 3.0 through 3.7.3 suffer from a local privilege escalation vulnerability in the installer part. The vulnerability is related to the installation of the configuration file \"at.obdev.littlesnitchd.plist\" which gets installed to /Library/LaunchDaemons." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "unspecified" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.obdev.at/products/littlesnitch/releasenotes.html", "refsource": "CONFIRM", "url": "https://www.obdev.at/products/littlesnitch/releasenotes.html" }, { "name": "https://twitter.com/patrickwardle/status/849076615170711552", "refsource": "MISC", "url": "https://twitter.com/patrickwardle/status/849076615170711552" } ] } } } }, "cveMetadata": { "assignerOrgId": "e0cebea7-a708-4bfe-81c1-855d35eb4544", "assignerShortName": "obdev", "cveId": "CVE-2017-2675", "datePublished": "2017-04-06T15:00:00", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-08-05T14:02:07.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }