VYPR
Unrated severityNVD Advisory· Published Oct 23, 2015· Updated May 6, 2026

CVE-2015-5932

CVE-2015-5932

Description

The kernel in Apple OS X before 10.11.1 allows local users to gain privileges by leveraging an unspecified "type confusion" during Mach task processing.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A type confusion vulnerability in the XNU kernel's Mach task handling allows local privilege escalation on OS X before 10.11.1.

Vulnerability

A type confusion vulnerability exists in the XNU kernel's Mach task processing code in Apple OS X versions prior to 10.11.1. The issue occurs when the kernel incorrectly handles object types during Mach task operations, leading to memory corruption. This affects OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan 10.11 [1].

Exploitation

An attacker with local access to the system can exploit this vulnerability by executing a specially crafted application that triggers the type confusion during Mach task processing. No additional authentication or user interaction beyond local access is required [1].

Impact

Successful exploitation allows a local attacker to escalate privileges to kernel level, gaining full control over the affected system. This includes the ability to execute arbitrary code with kernel privileges, bypass security mechanisms, and access sensitive data [1].

Mitigation

Apple addressed this vulnerability in OS X El Capitan 10.11.1, as well as Security Update 2015-004 for Yosemite and Security Update 2015-007 for Mavericks. Users should update to the latest available version for their OS X release [1].

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.