Description
Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid.
Published: 2018-06-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-2542 Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid.
History

No history.

Subscriptions

Apple Macos
Objective Development Little Snitch
cve-icon MITRE

Status: PUBLISHED

Assigner: obdev

Published:

Updated: 2024-09-16T21:03:03.661Z

Reserved: 2018-04-27T00:00:00.000Z

Link: CVE-2018-10470

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-12T17:29:00.207

Modified: 2024-11-21T03:41:22.493

Link: CVE-2018-10470

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses