Mac OS X 10.7.x < 10.7.4 Multiple Vulnerabilities (BEAST)

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a Mac OS X update that fixes several
security issues.

Description :

The remote host is running a version of Mac OS X 10.7.x that is prior
to 10.7.4. The newer version contains numerous security-related fixes
for the following components :

- Login Window
- Bluetooth
- curl
- HFS
- Kernel
- libarchive
- libsecurity
- libxml
- LoginUIFramework
- PHP
- Quartz Composer
- QuickTime
- Ruby
- Security Framework
- Time Machine
- X11

Note that this update addresses the recent FileVault password
vulnerability, in which user passwords are stored in plaintext to a
system-wide debug log if the legacy version of FileVault is used to
encrypt user directories after a system upgrade to Lion. Since the
patch only limits further exposure, though, we recommend that all
users on the system change their passwords if user folders were
encrypted using the legacy version of FileVault prior to and after an
upgrade to OS X 10.7.

See also :

https://www.tenable.com/security/research/tra-2012-02
http://support.apple.com/kb/HT5281
http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
http://www.zerodayinitiative.com/advisories/ZDI-12-135
http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0064.html
https://www.imperialviolet.org/2011/09/23/chromeandbeast.html
https://www.openssl.org/~bodo/tls-cbc.txt

Solution :

Upgrade to Mac OS X 10.7.4 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial