Little Snitch version 3.0 through 3.6.1 suffer from a buffer overflow vulnerability that could be locally exploited which could lead to an escalation of privileges (EoP) and unauthorised ring0 access to the operating system. The buffer overflow is related to insufficient checking of parameters to the "OSMalloc" and "copyin" kernel API calls.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 02:59
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/94352 - | |
| References | () https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one - | 
07 Nov 2023, 02:36
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/94352 - | |
| References | () https://speakerdeck.com/patrickwardle/defcon-2016-i-got-99-problems-but-little-snitch-aint-one - | 
Information
                Published : 2016-11-15 15:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-8661
Mitre link : CVE-2016-8661
CVE.ORG link : CVE-2016-8661
JSON object : View
Products Affected
                obdev
- little_snitch
 
CWE
                
                    
                        
                        CWE-119
                        
            Improper Restriction of Operations within the Bounds of a Memory Buffer
