VYPR
Unrated severityNVD Advisory· Published Oct 9, 2015· Updated May 6, 2026

CVE-2015-5897

CVE-2015-5897

Description

The Address Book framework in Apple OS X before 10.11 allows local users to gain privileges by using an environment variable to inject code into processes that rely on this framework.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Local users can inject arbitrary code into processes using the Address Book framework via an environment variable, leading to privilege escalation on OS X before 10.11.

Vulnerability

The Address Book framework in Apple OS X versions prior to 10.11 (El Capitan) improperly handles an environment variable, allowing a local attacker to inject arbitrary code into any process that loads the framework [1]. The issue was present in all supported versions of OS X before the 10.11 update.

Exploitation

A local user with access to the system can set a malicious environment variable before launching a process that relies on the Address Book framework. When the process loads the framework, the injected code is executed. No additional authentication or user interaction beyond local access is required.

Impact

Successful exploitation allows the attacker to execute arbitrary code in the context of the target process. If the process runs with elevated privileges, the attacker can gain those privileges, leading to full system compromise.

Mitigation

Apple addressed this vulnerability in OS X 10.11 (El Capitan) by improving environment variable handling [1]. Users should upgrade to OS X 10.11 or later. No workarounds are documented.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.