Vulnerability Details : CVE-2012-0656
Race condition in LoginUIFramework in Apple Mac OS X 10.7.x before 10.7.4, when the Guest account is enabled, allows physically proximate attackers to login to arbitrary accounts by entering the account name and no password.
Exploit prediction scoring system (EPSS) score for CVE-2012-0656
Probability of exploitation activity in the next 30 days: 0.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 23 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-0656
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2012-0656
-
The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0656
-
http://www.securityfocus.com/bid/53459
Apple Mac OS X CVE-2012-0656 Race Condition Security Bypass Vulnerability
-
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
Apple - Lists.apple.comVendor Advisory
-
http://support.apple.com/kb/HT5281
About the security content of OS X Lion v10.7.4 and Security Update 2012-002 - Apple SupportVendor Advisory
-
http://www.securityfocus.com/bid/53445
Apple Mac OS X Security Update 2012-002 Multiple Security Vulnerabilities
Products affected by CVE-2012-0656
- cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.7.3:*:*:*:*:*:*:*