Mac OS X 10.10.5 / 10.11.6 Multiple Vulnerabilities (Security Update 2016-002 / 2016-006)

high Nessus Plugin ID 100427

Synopsis

The remote host is missing a Mac OS X update that fixes multiple vulnerabilities.

Description

The remote host is running a version of Mac OS X that is 10.10.5 but is missing Security Update 2016-006, or else it is version 10.11.6 but is missing Security Update 2016-002. It is, therefore, affected by multiple vulnerabilities :

- A memory corruption issue exists in the AppleGraphicsControl component due to improper lock state checking. A local attacker can exploit this, via a specially crafted application, to execute arbitrary code with kernel-level privileges. (CVE-2016-4662)

- A memory corruption issue exists in the NVIDIA Graphics Driver due to improper validation of user-supplied input. A local attacker can exploit this to cause a denial of service condition. (CVE-2016-4663)

- Multiple flaws exist in the System Boot component due to improper validation of user-supplied input. A local attacker can exploit these to terminate the system or execute arbitrary code with kernel-level privileges.
(CVE-2016-4669)

- An out-of-bounds write error exists in the ImageIO component when parsing PDF files due to improper bounds checking. An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted PDF file, to execute arbitrary code.
(CVE-2016-4671)

- A memory corruption issue exists in the Core Image component when handling JPEG files due to improper validation of user-supplied input. An unauthenticated, remote attacker can exploit this, by convincing a user to open a specially crafted JPEG file, to execute arbitrary code. (CVE-2016-4681)

- An out-of-bounds read error exists in the ImageIO component when parsing specially crafted SGI images. An unauthenticated, remote attacker can exploit this to disclose potentially sensitive information in process memory. (CVE-2016-4682)

- Multiple out-of-bounds read and write errors exist in the ImageIO component when parsing specially crafted SGI images. An unauthenticated, remote attacker can exploit these to disclose potentially sensitive information, cause a denial of service condition, or execute arbitrary code. (CVE-2016-4683)

Solution

If running Mac OS X version 10.10.5, install Security Update 2016-006 or later. If running version Mac OS X version 10.11.6, install Security Update 2016-002 or later.

See Also

https://support.apple.com/en-us/HT207275

http://www.nessus.org/u?34f01fa1

Plugin Details

Severity: High

ID: 100427

File Name: macosx_SecUpd_10_11_6_2016-002__10_10_5_2016-006.nasl

Version: 1.6

Type: local

Agent: macosx

Published: 5/26/2017

Updated: 11/13/2019

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2016-4671

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/24/2016

Vulnerability Publication Date: 10/24/2016

Reference Information

CVE: CVE-2016-4662, CVE-2016-4663, CVE-2016-4669, CVE-2016-4671, CVE-2016-4681, CVE-2016-4682, CVE-2016-4683

BID: 93849, 93852, 94431

APPLE-SA: APPLE-SA-2016-10-24-2