CVE-2016-8661 (GCVE-0-2016-8661)
Vulnerability from cvelistv5 – Published: 2016-11-15 15:00 – Updated: 2024-08-06 02:27
VLAI?
Summary
Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the "OSMalloc" and "copyin" kernel API calls.
Severity ?
No CVSS data available.
CWE
- escalation of privileges
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Little Snitch version 3.0 through 3.6.1 |
Affected:
Little Snitch version 3.0 through 3.6.1
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T02:27:41.325Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "94352",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/94352"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Little Snitch version 3.0 through 3.6.1",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Little Snitch version 3.0 through 3.6.1"
}
]
}
],
"datePublic": "2016-11-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the \"OSMalloc\" and \"copyin\" kernel API calls."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "escalation of privileges",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2016-11-25T19:57:01",
"orgId": "e0cebea7-a708-4bfe-81c1-855d35eb4544",
"shortName": "obdev"
},
"references": [
{
"name": "94352",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/94352"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-8661",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Little Snitch version 3.0 through 3.6.1",
"version": {
"version_data": [
{
"version_value": "Little Snitch version 3.0 through 3.6.1"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the \"OSMalloc\" and \"copyin\" kernel API calls."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "escalation of privileges"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "94352",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/94352"
},
{
"name": "https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one",
"refsource": "MISC",
"url": "https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "e0cebea7-a708-4bfe-81c1-855d35eb4544",
"assignerShortName": "obdev",
"cveId": "CVE-2016-8661",
"datePublished": "2016-11-15T15:00:00",
"dateReserved": "2016-10-14T00:00:00",
"dateUpdated": "2024-08-06T02:27:41.325Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3104B3C-7FB4-45D8-8B94-38C64DB5358E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83C15999-BD32-4576-976A-2B516A159BEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B790676-4683-4C37-8D6C-A7422F29D5B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA526073-1289-4A26-8D06-2F33318AD940\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3AAF8D9-02A7-4AE4-A386-6DDC0F813163\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D210C3B-3A48-4ACF-A957-253F15962EE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35027020-5BFD-45EA-9371-7342B3CA9AAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFCCA6D8-420C-438A-806D-E3B909B12701\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8B0447E-6A54-42ED-81A9-B4B16EF2C05B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08087DF0-3980-4F59-A759-DD5D710CB5FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91998865-31C0-4F6F-A4E9-14F3C4727C5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76108E38-65E9-4918-BB90-DCD6063E64F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F625187-402F-461E-A760-EB967DA79E89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A00C225-33C2-4F4A-AAF8-131A6FC8CC52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"918A02B3-1F03-478E-990B-EDE245F69495\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F518B2CE-C946-47EF-81BF-C3DF3A2CF9B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D8D953E-4FC7-4F31-8DB5-DC2C5115CC92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34A22CFD-D6A7-4EAE-A459-69453ADEB703\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"239823E3-A508-4B67-8A5F-7DCFCCBD1C24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BACEFA0-52CD-45C7-B0A0-A9B4A1EA9B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:obdev:little_snitch:3.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0CA536C-001F-438F-8078-C6A4F51A6C15\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the \\\"OSMalloc\\\" and \\\"copyin\\\" kernel API calls.\"}, {\"lang\": \"es\", \"value\": \"Little Snitch versi\\u00f3n 3.0 hasta la versi\\u00f3n 3.6.1 sufre de una vulnerabilidad de desbordamiento de b\\u00fafer que podr\\u00eda ser explotada localmente lo que podr\\u00eda conducir a una escalada de privilegios (EoP) y un acceso no autorizado al sistema operativo. El desbordamiento de b\\u00fafer est\\u00e1 relacionado con una comprobaci\\u00f3n insuficiente de los par\\u00e1metros para las llamadas de la API del kernel \\\"OSMalloc\\\" y \\\"copyin\\\".\"}]",
"id": "CVE-2016-8661",
"lastModified": "2024-11-21T02:59:47.510",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.4, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.5, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2016-11-15T15:59:00.180",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/94352\", \"source\": \"office@obdev.at\"}, {\"url\": \"https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one\", \"source\": \"office@obdev.at\"}, {\"url\": \"http://www.securityfocus.com/bid/94352\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "office@obdev.at",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2016-8661\",\"sourceIdentifier\":\"office@obdev.at\",\"published\":\"2016-11-15T15:59:00.180\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the \\\"OSMalloc\\\" and \\\"copyin\\\" kernel API calls.\"},{\"lang\":\"es\",\"value\":\"Little Snitch versi\u00f3n 3.0 hasta la versi\u00f3n 3.6.1 sufre de una vulnerabilidad de desbordamiento de b\u00fafer que podr\u00eda ser explotada localmente lo que podr\u00eda conducir a una escalada de privilegios (EoP) y un acceso no autorizado al sistema operativo. El desbordamiento de b\u00fafer est\u00e1 relacionado con una comprobaci\u00f3n insuficiente de los par\u00e1metros para las llamadas de la API del kernel \\\"OSMalloc\\\" y \\\"copyin\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3104B3C-7FB4-45D8-8B94-38C64DB5358E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C15999-BD32-4576-976A-2B516A159BEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B790676-4683-4C37-8D6C-A7422F29D5B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA526073-1289-4A26-8D06-2F33318AD940\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AAF8D9-02A7-4AE4-A386-6DDC0F813163\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D210C3B-3A48-4ACF-A957-253F15962EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35027020-5BFD-45EA-9371-7342B3CA9AAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFCCA6D8-420C-438A-806D-E3B909B12701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8B0447E-6A54-42ED-81A9-B4B16EF2C05B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08087DF0-3980-4F59-A759-DD5D710CB5FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91998865-31C0-4F6F-A4E9-14F3C4727C5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76108E38-65E9-4918-BB90-DCD6063E64F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F625187-402F-461E-A760-EB967DA79E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A00C225-33C2-4F4A-AAF8-131A6FC8CC52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"918A02B3-1F03-478E-990B-EDE245F69495\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F518B2CE-C946-47EF-81BF-C3DF3A2CF9B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D8D953E-4FC7-4F31-8DB5-DC2C5115CC92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A22CFD-D6A7-4EAE-A459-69453ADEB703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"239823E3-A508-4B67-8A5F-7DCFCCBD1C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BACEFA0-52CD-45C7-B0A0-A9B4A1EA9B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:obdev:little_snitch:3.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0CA536C-001F-438F-8078-C6A4F51A6C15\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/94352\",\"source\":\"office@obdev.at\"},{\"url\":\"https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one\",\"source\":\"office@obdev.at\"},{\"url\":\"http://www.securityfocus.com/bid/94352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…