Mac OS X Multiple Vulnerabilities (Security Update 2015-001) (POODLE)

critical Nessus Plugin ID 81088

Synopsis

The remote host is missing a Mac OS X update that fixes multiple security issues.

Description

The remote host is running a version of Mac OS X 10.8 or 10.9 that does not have Security Update 2015-001 applied. This update contains several security-related fixes for the following components :

- AFP Server
- Bluetooth
- CoreGraphics
- CoreSymbolication
- FontParser
- Foundation
- Intel Graphics Driver
- IOAcceleratorFamily
- IOHIDFamily
- Kernel
- LaunchServices
- libnetcore
- LoginWindow
- lukemftp
- OpenSSL
- Sandbox
- SceneKit
- Security
- security_taskgate
- Spotlight
- sysmond

Note that successful exploitation of the most serious issues can result in arbitrary code execution.

Solution

Install Security Update 2015-001 or later.

See Also

https://support.apple.com/en-us/HT204244

http://www.securityfocus.com/archive/1/534559

https://www.imperialviolet.org/2014/10/14/poodle.html

https://www.openssl.org/~bodo/ssl-poodle.pdf

https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00

Plugin Details

Severity: Critical

ID: 81088

File Name: macosx_SecUpd2015-001.nasl

Version: 1.16

Type: local

Agent: macosx

Published: 1/29/2015

Updated: 5/28/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2014-4486

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x:10.8, cpe:/o:apple:mac_os_x:10.9

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/27/2015

Vulnerability Publication Date: 9/18/2013

Exploitable With

Metasploit (tnftp "savefile" Arbitrary Command Execution)

Reference Information

CVE: CVE-2011-2391, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568, CVE-2014-4426, CVE-2014-4461, CVE-2014-4481, CVE-2014-4483, CVE-2014-4484, CVE-2014-4485, CVE-2014-4486, CVE-2014-4487, CVE-2014-4488, CVE-2014-4489, CVE-2014-4491, CVE-2014-4492, CVE-2014-4495, CVE-2014-4497, CVE-2014-7861, CVE-2014-8517, CVE-2014-8816, CVE-2014-8817, CVE-2014-8819, CVE-2014-8820, CVE-2014-8821, CVE-2014-8822, CVE-2014-8824, CVE-2014-8826, CVE-2014-8827, CVE-2014-8828, CVE-2014-8829, CVE-2014-8830, CVE-2014-8831, CVE-2014-8832, CVE-2014-8835, CVE-2014-8838

BID: 62531, 70249, 70574, 70585, 70586, 70623, 70792, 71136, 72327, 72328

APPLE-SA: APPLE-SA-2015-01-27-4

CERT: 577193