Mac OS X Multiple Vulnerabilities (Security Updates 2015-005 / 2015-008)

critical Nessus Plugin ID 87321

Synopsis

The remote host is missing a Mac OS X update that fixes multiple security vulnerabilities.

Description

The remote host is running a version of Mac OS X 10.9.5 or 10.10.5 that is missing Security Update 2015-005 or 2015-008. It is, therefore, affected by multiple vulnerabilities in the following components :

- apache_mod_php
- AppSandbox
- Bluetooth
- CFNetwork HTTPProtocol
- Compression
- Configuration Profiles
- CoreGraphics
- CoreMedia Playback
- Disk Images
- EFI
- File Bookmark
- Hypervisor
- iBooks
- ImageIO
- Intel Graphics Driver
- IOAcceleratorFamily
- IOHIDFamily
- IOKit SCSI
- IOThunderboltFamily
- Kernel
- kext tools
- Keychain Access
- libarchive
- libc
- libexpat
- libxml2
- OpenGL
- OpenLDAP
- OpenSSH
- QuickLook
- Sandbox
- Security
- System Integrity Protection

Note that successful exploitation of the most serious issues can result in arbitrary code execution.

Solution

Install Security Update 2015-006 (OS X 10.9.5) / 2015-008 (OS X 10.10.5) or later. Note that Security Update 2015-006 is a replacement for the earlier 2015-005 update mentioned in the original advisory.

See Also

https://support.apple.com/en-us/HT205637

http://www.nessus.org/u?ec39a4a4

Plugin Details

Severity: Critical

ID: 87321

File Name: macosx_SecUpd2015-008.nasl

Version: 1.12

Type: local

Agent: macosx

Published: 12/11/2015

Updated: 5/28/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x:10.10, cpe:/o:apple:mac_os_x:10.9

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/8/2015

Vulnerability Publication Date: 8/11/2011

Reference Information

CVE: CVE-2011-2895, CVE-2012-0876, CVE-2012-1147, CVE-2012-1148, CVE-2015-3807, CVE-2015-5333, CVE-2015-5334, CVE-2015-6908, CVE-2015-7001, CVE-2015-7038, CVE-2015-7039, CVE-2015-7040, CVE-2015-7041, CVE-2015-7042, CVE-2015-7043, CVE-2015-7044, CVE-2015-7045, CVE-2015-7046, CVE-2015-7047, CVE-2015-7052, CVE-2015-7053, CVE-2015-7054, CVE-2015-7058, CVE-2015-7059, CVE-2015-7060, CVE-2015-7061, CVE-2015-7062, CVE-2015-7063, CVE-2015-7064, CVE-2015-7065, CVE-2015-7066, CVE-2015-7067, CVE-2015-7068, CVE-2015-7071, CVE-2015-7073, CVE-2015-7074, CVE-2015-7075, CVE-2015-7076, CVE-2015-7077, CVE-2015-7078, CVE-2015-7081, CVE-2015-7083, CVE-2015-7084, CVE-2015-7094, CVE-2015-7105, CVE-2015-7106, CVE-2015-7107, CVE-2015-7108, CVE-2015-7109, CVE-2015-7110, CVE-2015-7111, CVE-2015-7112, CVE-2015-7803, CVE-2015-7804

BID: 49124, 52379, 76343, 76714, 76959, 77112, 78719, 78721, 78725, 78730, 78733, 78735

APPLE-SA: APPLE-SA-2015-12-08-3