CVE-2015-3773
Description
The SMB client in Apple OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The SMB client in Apple OS X before 10.10.5 contains a memory corruption vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service.
Vulnerability
The SMB client in Apple OS X is affected by a memory corruption vulnerability. The issue exists in versions prior to OS X Yosemite v10.10.5 and Security Update 2015-006. The vulnerability is triggered via unspecified vectors, as described in the official advisory [1].
Exploitation
An attacker can exploit this vulnerability remotely by sending crafted SMB traffic to the target system. No authentication is required, and the attack does not require user interaction beyond the system being reachable over the network. The exact sequence of steps is not disclosed, but the vector involves memory corruption in the SMB client.
Impact
Successful exploitation allows an attacker to execute arbitrary code with the privileges of the SMB client process, or cause a denial of service through application crash. This can lead to full system compromise if the attacker gains elevated privileges.
Mitigation
Apple addressed this vulnerability in OS X Yosemite v10.10.5 and Security Update 2015-006, released on August 13, 2015 [1]. Users should update to the latest version. No workarounds are available for unpatched systems.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <10.10.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- lists.apple.com/archives/security-announce/2015/Aug/msg00001.htmlnvdVendor Advisory
- support.apple.com/kb/HT205031nvdVendor Advisory
- www.securityfocus.com/bid/76340nvd
- www.securitytracker.com/id/1033276nvd
News mentions
0No linked articles in our index yet.