Security bypass vulnerability in EFI in Apple OS X by increasing memory refresh ratesID: oval:org.secpod.oval:def:25246 | Date: (C)2015-07-07 (M)2024-02-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.3 and is prone to a security bypass vulnerability. A flaw is present in the application, which does not properly set refresh rates for DDR3 RAM. Successful exploitation allows attackers to conduct row-hammer attacks, and consequently gain privileges or cause a denial of service (memory corruption).
Platform: |
Apple Mac OS X 10.8 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.10 |