Mac OS X Multiple Vulnerabilities (Security Update 2015-001) (POODLE)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a Mac OS X update that fixes multiple
security issues.

Description :

The remote host is running a version of Mac OS X 10.8 or 10.9 that
does not have Security Update 2015-001 applied. This update contains
several security-related fixes for the following components :

- AFP Server
- Bluetooth
- CoreGraphics
- CoreSymbolication
- FontParser
- Foundation
- Intel Graphics Driver
- IOAcceleratorFamily
- IOHIDFamily
- Kernel
- LaunchServices
- libnetcore
- LoginWindow
- lukemftp
- OpenSSL
- Sandbox
- SceneKit
- Security
- security_taskgate
- Spotlight
- sysmond

Note that successful exploitation of the most serious issues can
result in arbitrary code execution.

See also :

https://support.apple.com/en-us/HT204244
http://www.securityfocus.com/archive/1/534559
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00

Solution :

Install Security Update 2015-001 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false