macOS : macOS Server < 5.3 Multiple Vulnerabilities

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a security update for macOS Server.

Description :

The version of macOS Server (formerly known as Mac OS X Server)
installed on the remote host is prior to 5.3. It is, therefore,
affected by the following vulnerabilities :

- A denial of service vulnerability exists in the Apache
HTTP server when handling a saturation of partial HTTP
requests. An unauthenticated, remote attacker can
exploit this to crash the daemon. (CVE-2007-6750)

- A denial of service vulnerability exists in Action Pack
in Ruby on Rails due to improper restrictions on the use
of the MIME type cache when handling specially crafted
HTTP accept headers. An unauthenticated, remote attacker
can exploit this to cause the cache to grow
indefinitely. (CVE-2016-0751)

- An information disclosure vulnerability exists in the
Wiki Server component due to improper checking of
unspecified permissions. An unauthenticated, remote can
exploit this to enumerate users. (CVE-2017-2382)

See also :

https://support.apple.com/en-us/HT207604
http://www.nessus.org/u?e4736faa

Solution :

Upgrade to macOS Server version 5.3 or later. Note that macOS Server
version 5.3 is available only for macOS 10.12.4 or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: MacOS X Local Security Checks

Nessus Plugin ID: 99128 ()

Bugtraq ID: 21865
81800
97128

CVE ID: CVE-2007-6750
CVE-2016-0751
CVE-2017-2382

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now