This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.
The remote Mac OS X host has a browser plugin installed that is
affected by multiple vulnerabilities.
The version of Adobe AIR installed on the remote Mac OS X host is
equal or prior to version 188.8.131.52. It is, therefore, affected by
multiple vulnerabilities :
- An unspecified vulnerability exists related to the
defense-in-depth feature in the Flash Broker API. No
other details are available. (CVE-2015-5569)
- Multiple unspecified memory corruption issues exist due
to improper validation of user-supplied input. A remote
attacker can exploit this to execute arbitrary code.
(CVE-2015-7625, CVE-2015-7626, CVE-2015-7627,
CVE-2015-7630, CVE-2015-7633, CVE-2015-7634)
- A unspecified vulnerability exists that can be exploited
by a remote attacker to bypass the same-origin policy,
allowing the disclosure of sensitive information.
- Multiple unspecified use-after-free errors exist that
can be exploited by a remote attacker to deference
already freed memory, potentially allowing the
execution of arbitrary code. (CVE-2015-7629,
CVE-2015-7631, CVE-2015-7643, CVE-2015-7644)
- An unspecified buffer overflow condition exists due to
improper validation of user-supplied input. An attacker
can exploit this to execute arbitrary code.
See also :
Upgrade to Adobe AIR version 184.108.40.206 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Family: MacOS X Local Security Checks
Nessus Plugin ID: 86384 ()
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now