Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid.
Advisories
Source ID Title
EUVD EUVD EUVD-2018-2542 Little Snitch versions 4.0 to 4.0.6 use the SecStaticCodeCheckValidityWithErrors() function without the kSecCSCheckAllArchitectures flag and therefore do not validate all architectures stored in a fat binary. An attacker can maliciously craft a fat binary containing multiple architectures that may cause a situation where Little Snitch treats the running process as having no code signature at all while erroneously indicating that the binary on disk does have a valid code signature. This could lead to users being confused about whether or not the code signature is valid.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: obdev

Published:

Updated: 2024-09-16T21:03:03.661Z

Reserved: 2018-04-27T00:00:00

Link: CVE-2018-10470

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-12T17:29:00.207

Modified: 2024-11-21T03:41:22.493

Link: CVE-2018-10470

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.