CVE-2016-8661 (GCVE-0-2016-8661)
Vulnerability from cvelistv5
Published
2016-11-15 15:00
Modified
2024-08-06 02:27
Severity ?
CWE
  • escalation of privileges
Summary
Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the "OSMalloc" and "copyin" kernel API calls.
Impacted products
Vendor Product Version
n/a Little Snitch version 3.0 through 3.6.1 Version: Little Snitch version 3.0 through 3.6.1
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:27:41.325Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "94352",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94352"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Little Snitch version 3.0 through 3.6.1",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Little Snitch version 3.0 through 3.6.1"
            }
          ]
        }
      ],
      "datePublic": "2016-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the \"OSMalloc\" and \"copyin\" kernel API calls."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privileges",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "e0cebea7-a708-4bfe-81c1-855d35eb4544",
        "shortName": "obdev"
      },
      "references": [
        {
          "name": "94352",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94352"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-8661",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Little Snitch version 3.0 through 3.6.1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Little Snitch version 3.0 through 3.6.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the \"OSMalloc\" and \"copyin\" kernel API calls."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privileges"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "94352",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94352"
            },
            {
              "name": "https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one",
              "refsource": "MISC",
              "url": "https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e0cebea7-a708-4bfe-81c1-855d35eb4544",
    "assignerShortName": "obdev",
    "cveId": "CVE-2016-8661",
    "datePublished": "2016-11-15T15:00:00",
    "dateReserved": "2016-10-14T00:00:00",
    "dateUpdated": "2024-08-06T02:27:41.325Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-8661\",\"sourceIdentifier\":\"office@obdev.at\",\"published\":\"2016-11-15T15:59:00.180\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the \\\"OSMalloc\\\" and \\\"copyin\\\" kernel API calls.\"},{\"lang\":\"es\",\"value\":\"Little Snitch versi\u00f3n 3.0 hasta la versi\u00f3n 3.6.1 sufre de una vulnerabilidad de desbordamiento de b\u00fafer que podr\u00eda ser explotada localmente lo que podr\u00eda conducir a una escalada de privilegios (EoP) y un acceso no autorizado al sistema operativo. El desbordamiento de b\u00fafer est\u00e1 relacionado con una comprobaci\u00f3n insuficiente de los par\u00e1metros para las llamadas de la API del kernel \\\"OSMalloc\\\" y \\\"copyin\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3104B3C-7FB4-45D8-8B94-38C64DB5358E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C15999-BD32-4576-976A-2B516A159BEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B790676-4683-4C37-8D6C-A7422F29D5B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA526073-1289-4A26-8D06-2F33318AD940\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AAF8D9-02A7-4AE4-A386-6DDC0F813163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D210C3B-3A48-4ACF-A957-253F15962EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35027020-5BFD-45EA-9371-7342B3CA9AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFCCA6D8-420C-438A-806D-E3B909B12701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8B0447E-6A54-42ED-81A9-B4B16EF2C05B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08087DF0-3980-4F59-A759-DD5D710CB5FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91998865-31C0-4F6F-A4E9-14F3C4727C5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76108E38-65E9-4918-BB90-DCD6063E64F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F625187-402F-461E-A760-EB967DA79E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A00C225-33C2-4F4A-AAF8-131A6FC8CC52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"918A02B3-1F03-478E-990B-EDE245F69495\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F518B2CE-C946-47EF-81BF-C3DF3A2CF9B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D8D953E-4FC7-4F31-8DB5-DC2C5115CC92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A22CFD-D6A7-4EAE-A459-69453ADEB703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"239823E3-A508-4B67-8A5F-7DCFCCBD1C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BACEFA0-52CD-45C7-B0A0-A9B4A1EA9B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0CA536C-001F-438F-8078-C6A4F51A6C15\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/94352\",\"source\":\"office@obdev.at\"},{\"url\":\"https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one\",\"source\":\"office@obdev.at\"},{\"url\":\"http://www.securityfocus.com/bid/94352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…