Language:
http://www.zerodayinitiative.com/advisories/ZDI-13-055/
http://support.apple.com/kb/HT5672
http://lists.apple.com/archives/security-announce/2013/Mar/msg00002.html
Severity: High
ID: 65578
File Name: macosx_SecUpd2013-001.nasl
Version: 1.19
Type: local
Agent: macosx
Family: MacOS X Local Security Checks
Published: 3/15/2013
Updated: 5/28/2024
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: High
Base Score: 9.3
Temporal Score: 7.7
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE: cpe:/o:apple:mac_os_x:10.6, cpe:/o:apple:mac_os_x:10.7
Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 3/14/2013
Vulnerability Publication Date: 3/28/2012
Metasploit (Ruby on Rails JSON Processor YAML Deserialization Code Execution)
CVE: CVE-2011-3058, CVE-2012-2088, CVE-2012-3488, CVE-2012-3489, CVE-2012-3525, CVE-2012-3756, CVE-2013-0156, CVE-2013-0333, CVE-2013-0963, CVE-2013-0966, CVE-2013-0967, CVE-2013-0971, CVE-2013-0973
BID: 52762, 54270, 55072, 55074, 55167, 56552, 57187, 57575, 57598, 58509, 58513, 58514, 58516
APPLE-SA: APPLE-SA-2013-03-14-1