Vulnerabilities > CVE-2018-6336 - 7PK - Security Features vulnerability in Linuxfoundation Osquery

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
linuxfoundation
CWE-254
nessus

Summary

An issue was discovered in osquery. A maliciously crafted Universal/fat binary can evade third-party code signing checks. By not completing full inspection of the Universal/fat binary, the user of the third-party tool will believe that the code is signed by Apple, but the malicious unsigned code will execute. This issue affects osquery prior to v3.2.7

Vulnerable Configurations

Part Description Count
Application
Linuxfoundation
89

Common Weakness Enumeration (CWE)

Nessus

NASL familyMacOS X Local Security Checks
NASL idMACOSX_FACEBOOK_OSQUERY_3_2_7.NASL
descriptionThe installed version of Facebook OSQuery is less than 3.2.7 and is therefore vulnerable to allowing execution of malicious binaries due to accepting forged Apple signatures.
last seen2020-06-01
modified2020-06-02
plugin id110643
published2018-06-22
reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/110643
titleFacebook OSQuery Code Signing Bypass (macOS)

The Hacker News

idTHN:EAF6F042171A19B82AF7D46D233208C1
last seen2018-06-12
modified2018-06-12
published2018-06-12
reporterSwati Khandelwal
sourcehttps://thehackernews.com/2018/06/apple-mac-code-signing.html
titleSignature Validation Bug Let Malware Bypass Several Mac Security Products