CVE-2015-3695
Description
Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3696, CVE-2015-3697, CVE-2015-3698, CVE-2015-3699, CVE-2015-3700, CVE-2015-3701, and CVE-2015-3702.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A buffer overflow in the Intel Graphics Driver on OS X before 10.10.4 allows local users to gain elevated privileges.
Vulnerability
A buffer overflow vulnerability exists in the Intel Graphics Driver component of Apple OS X versions prior to 10.10.4. The flaw can be triggered via unspecified vectors, allowing a local attacker to corrupt memory. This issue is distinct from several other related CVEs (CVE-2015-3696 through CVE-2015-3702) also addressed in the same update [1].
Exploitation
Exploitation requires local access to the system. An attacker must execute a crafted application that triggers the buffer overflow in the Intel Graphics Driver. No additional authentication beyond standard user privileges is needed, as the driver operates in kernel space and can be reached from user mode [1].
Impact
Successful exploitation allows a local user to gain elevated privileges, potentially leading to full system compromise. The attacker can execute arbitrary code with kernel-level permissions, bypassing security restrictions [1].
Mitigation
Apple addressed this vulnerability in OS X Yosemite v10.10.4 and Security Update 2015-005, released on June 30, 2015. Users should update to the latest version of OS X. No workarounds are documented; the only mitigation is applying the patch [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <10.10.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlnvdPatchVendor Advisory
- support.apple.com/kb/HT204942nvdVendor Advisory
- www.securityfocus.com/bid/75493nvd
- www.securitytracker.com/id/1032760nvd
News mentions
0No linked articles in our index yet.