Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:objective_development:little_snitch:*:*:*:*:*:*:*:*", "matchCriteriaId": "14CA0E0C-AAE6-4E95-A4F9-928DDDA89E1C", "versionEndIncluding": "4.0.6", "versionStartIncluding": "4.0", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid."}, {"lang": "es", "value": "Little Snitch desde la versi\u00f3n 4.0 hasta la 4.0.6 emplea la funci\u00f3n SecStaticCodeCheckValidityWithErrors() sin el flag kSecCSCheckAllArchitectures y, por lo tanto, no valida todas las arquitecturas almacenadas en un binario fat. Un atacante puede manipular maliciosamente un binario fat que contenga m\u00faltiples arquitecturas que podr\u00eda provocar una situaci\u00f3n por la que Little Snitch considera que el proceso en ejecuci\u00f3n no tiene firma de c\u00f3digo aunque indica que el binario en el disco tiene una firma de c\u00f3digo v\u00e1lida. Esto podr\u00eda conducir a que los usuarios est\u00e9n confusos sobre si la firma de c\u00f3digo es v\u00e1lida o no."}], "id": "CVE-2018-10470", "lastModified": "2024-11-21T03:41:22.493", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2018-06-12T17:29:00.207", "references": [{"source": "office@obdev.at", "url": "https://obdev.at/cve/2018-10470-8FRWkW4oH8.html"}, {"source": "office@obdev.at", "url": "https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://obdev.at/cve/2018-10470-8FRWkW4oH8.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.okta.com/security-blog/2018/06/issues-around-third-party-apple-code-signing-checks/"}], "sourceIdentifier": "office@obdev.at", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-347"}], "source": "office@obdev.at", "type": "Secondary"}, {"description": [{"lang": "en", "value": "CWE-347"}], "source": "nvd@nist.gov", "type": "Primary"}]}