Language:
http://www.zerodayinitiative.com/advisories/ZDI-13-111/
http://www.zerodayinitiative.com/advisories/ZDI-13-119/
http://www.zerodayinitiative.com/advisories/ZDI-13-150/
http://support.apple.com/kb/HT5784
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
Severity: Critical
ID: 66809
File Name: macosx_SecUpd2013-002.nasl
Version: 1.23
Type: local
Agent: macosx
Family: MacOS X Local Security Checks
Published: 6/5/2013
Updated: 5/28/2024
Supported Sensors: Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2013-0277
CPE: cpe:/o:apple:mac_os_x:10.6, cpe:/o:apple:mac_os_x:10.7
Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/4/2013
Vulnerability Publication Date: 5/17/2011
Core Impact
Metasploit (Ruby on Rails JSON Processor YAML Deserialization Code Execution)
CVE: CVE-2011-1945, CVE-2011-3207, CVE-2011-3210, CVE-2011-4108, CVE-2011-4109, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2012-0050, CVE-2012-2110, CVE-2012-2131, CVE-2012-2333, CVE-2012-4929, CVE-2013-0155, CVE-2013-0276, CVE-2013-0277, CVE-2013-0333, CVE-2013-0975, CVE-2013-0984, CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0990, CVE-2013-1024, CVE-2013-1854, CVE-2013-1855, CVE-2013-1856, CVE-2013-1857
BID: 47888, 49469, 49471, 51281, 51563, 53158, 53212, 53476, 55704, 57192, 57575, 57896, 57898, 58549, 58552, 58554, 58555, 60099, 60100, 60328, 60365, 60368, 60369
APPLE-SA: APPLE-SA-2013-06-04-1