CVE-2015-5897
Description
The Address Book framework in Apple OS X before 10.11 allows local users to gain privileges by using an environment variable to inject code into processes that rely on this framework.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Local users can inject arbitrary code into processes using the Address Book framework via an environment variable, leading to privilege escalation on OS X before 10.11.
Vulnerability
The Address Book framework in Apple OS X versions prior to 10.11 (El Capitan) improperly handles an environment variable, allowing a local attacker to inject arbitrary code into any process that loads the framework [1]. The issue was present in all supported versions of OS X before the 10.11 update.
Exploitation
A local user with access to the system can set a malicious environment variable before launching a process that relies on the Address Book framework. When the process loads the framework, the injected code is executed. No additional authentication or user interaction beyond local access is required.
Impact
Successful exploitation allows the attacker to execute arbitrary code in the context of the target process. If the process runs with elevated privileges, the attacker can gain those privileges, leading to full system compromise.
Mitigation
Apple addressed this vulnerability in OS X 10.11 (El Capitan) by improving environment variable handling [1]. Users should upgrade to OS X 10.11 or later. No workarounds are documented.
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <10.11
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlnvdVendor Advisory
- support.apple.com/HT205267nvdVendor Advisory
- www.securitytracker.com/id/1033703nvd
News mentions
0No linked articles in our index yet.