Mac OS X Multiple Vulnerabilities (Security Updates 2016-003 / 2016-007)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a Mac OS X update that fixes multiple
security vulnerabilities.

Description :

The remote host is running a version of Mac OS X 10.10.5 or 10.11.6
that is missing a security update. It is therefore, affected by
multiple vulnerabilities :

- A denial of service vulnerability exists in the
ssl_parse_clienthello_tlsext() function within file
ssl/t1_lib.c when handling oversize OCSP Status Request
extensions from clients. An unauthenticated, remote
attacker can exploit this to cause memory exhaustion in
a process linked with the library. (CVE-2016-6304)

- A memory corruption issue exists in Bluetooth due to
improper validation of user-supplied input. A local
attacker can exploit this, via a specially crafted
application, to cause a denial of service condition or
the execution of arbitrary code with kernel level
privileges. (CVE-2016-7596)

- A NULL pointer dereference flaw exists in the
CoreCapture component due to improper validation of
user-supplied input. A local attacker can exploit this
to cause a denial of service condition. (CVE-2016-7604)

See also :

https://support.apple.com/en-us/HT207423
http://www.nessus.org/u?38dabd46

Solution :

Install Security Update 2016-007 (OS X 10.10.5) / 2016-003 (OS X
10.11.6) or later.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 5.8
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 95918 ()

Bugtraq ID: 93150
94903

CVE ID: CVE-2016-6304
CVE-2016-7596
CVE-2016-7604

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now