VYPR
Unrated severityNVD Advisory· Published Oct 9, 2015· Updated May 6, 2026

CVE-2015-7760

CVE-2015-7760

Description

libxpc in launchd in Apple OS X before 10.11 does not restrict the creation of processes for network connections, which allows remote attackers to cause a denial of service (resource consumption) by repeatedly connecting to the SSH port, a different vulnerability than CVE-2015-7761.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

libxpc in launchd on OS X before 10.11 does not restrict process creation for SSH connections, enabling remote attackers to cause a denial of service via repeated connects.

Vulnerability

libxpc in launchd on Apple OS X before 10.11 lacks restrictions on creating processes for network connections, specifically for the SSH port. This allows a remote attacker to trigger excessive resource consumption by repeatedly connecting to the SSH service, as described in the official CVE entry [1]. The affected versions are OS X prior to 10.11 (El Capitan).

Exploitation

An attacker in a network position capable of reaching the affected host's SSH port (default 22) can repeatedly establish connections. The condition requires no authentication; the attacker simply initiates frequent TCP connections to the SSH port. The issue lies in how libxpc handles the creation of helper processes for each connection, leading to resource exhaustion without proper limits.

Impact

A successful attack causes a denial of service (resource consumption) on the target system. The exact resource (CPU, memory, process slots) is not specified in the description [1], but the outcome prevents legitimate users from accessing services or causes system instability. No privilege escalation or data disclosure is indicated.

Mitigation

Apple addressed the vulnerability in OS X 10.11 (El Capitan), released on September 30, 2015, as documented in the security content reference [1]. Users should upgrade to OS X 10.11 or later. No workaround is provided in the available references; systems unable to upgrade should restrict network access to the SSH port or use firewall rules to limit connection rates. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities catalog.

AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.