VYPR
Unrated severityNVD Advisory· Published Apr 10, 2015· Updated May 6, 2026

CVE-2015-1144

CVE-2015-1144

Description

Buffer overflow in the UniformTypeIdentifiers component in Apple OS X before 10.10.3 allows local users to gain privileges via a crafted Uniform Type Identifier.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A buffer overflow in OS X UniformTypeIdentifiers allows local users to gain privileges via a crafted UTI before 10.10.3.

Vulnerability

A buffer overflow vulnerability exists in the UniformTypeIdentifiers component of Apple OS X versions prior to 10.10.3. The issue is triggered when processing a crafted Uniform Type Identifier (UTI) string. This memory corruption can be exploited locally by an attacker who can supply a malicious UTI to the system.

Exploitation

An attacker with local access to the system can exploit this vulnerability by crafting a malicious Uniform Type Identifier and causing the UniformTypeIdentifiers component to process it. No user interaction beyond local access is required; the attacker only needs to be able to trigger the parsing of the crafted UTI, potentially through a custom application or command-line invocation.

Impact

Successful exploitation allows a local attacker to gain elevated privileges on the system. The buffer overflow can be used to execute arbitrary code in the context of a system process, leading to full system compromise.

Mitigation

The vulnerability is addressed in OS X Yosemite v10.10.3, released on April 8, 2015. Users should update to this version or later via the Mac App Store or Software Update. No workarounds are available for affected versions [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.