CVE-2015-3705
Description
IOAcceleratorFamily in Apple OS X before 10.10.4 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-3706.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory corruption vulnerability in IOAcceleratorFamily on Apple OS X before 10.10.4 allows arbitrary code execution in a privileged context via a crafted app.
Vulnerability
A memory corruption vulnerability exists in the IOAcceleratorFamily kernel extension on Apple OS X before 10.10.4. The bug is reachable when a crafted application interacts with the IOAccelerator interface, requiring no special configuration beyond normal user access to run a potentially malicious app. Affected versions include OS X Yosemite 10.10, 10.10.1, 10.10.2, and 10.10.3, as well as OS X Mavericks v10.9.5 (which is updated via Security Update 2015-005) [1].
Exploitation
An attacker must convince a user to run a crafted application, which then sends specially crafted data to the IOAcceleratorFamily kernel extension. The attacker does not need any special system privileges initially, only the ability to execute arbitrary user-level code. The crafted data triggers a memory corruption condition, leading to potential code execution within the kernel context [1].
Impact
Successful exploitation allows the attacker to execute arbitrary code in a privileged kernel context, effectively gaining full control over the system. This can lead to complete compromise of confidentiality, integrity, and availability. Additionally, the memory corruption can be used to cause a denial of service (system crash) [1].
Mitigation
Apple addressed this vulnerability in OS X Yosemite v10.10.4 and Security Update 2015-005 for OS X Mavericks v10.9.5, released on June 30, 2015 [1]. Users should update to the fixed versions via Software Update or Apple's support downloads. No public workaround is available; the only mitigation is to apply the security update.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <10.10.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- lists.apple.com/archives/security-announce/2015/Jun/msg00002.htmlnvdPatchVendor Advisory
- support.apple.com/kb/HT204942nvdVendor Advisory
- www.securityfocus.com/bid/75493nvd
- www.securitytracker.com/id/1032760nvd
News mentions
0No linked articles in our index yet.