Mac OS X Multiple EFI Vulnerabilities (EFI Security Update 2015-001)

high Nessus Plugin ID 84565

Synopsis

The remote host is affected by multiple vulnerabilities.

Description

The remote Mac OS X host is running EFI firmware that is affected by multiple vulnerabilities :

- An insufficient locking issue exists, when resuming from sleep states, which allows a local attacker to write to the EFI flash memory by using an crafted application with root privileges. (CVE-2015-3692)

- A flaw exists due to lax restrictions on memory refresh rates, which allows a specially crafted process to corrupt the memory of some DDR3 SDRAM devices by inducing bit flips in page table entries (PTEs), also known as a 'row-hammer attack'. An attacker can exploit this to gain elevated privileges by manipulating the PTEs. (CVE-2015-3693)

Solution

Install Mac EFI Security Update 2015-001.

See Also

https://support.apple.com/en-us/HT204934

Plugin Details

Severity: High

ID: 84565

File Name: macosx_SecUpdEFI2015-001.nasl

Version: 1.10

Type: local

Agent: macosx

Published: 7/7/2015

Updated: 11/27/2023

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2015-3693

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/30/2015

Vulnerability Publication Date: 6/14/2014

Reference Information

CVE: CVE-2015-3692, CVE-2015-3693

BID: 74971

APPLE-SA: APPLE-SA-2015-06-30-3