macOS < 10.13 Multiple Vulnerabilities

Critical Nessus Plugin ID 103598

Synopsis

The remote host is missing a macOS update that fixes multiple security vulnerabilities.

Description

The remote host is running a version of Mac OS X that is prior to 10.10.5, 10.11.x prior to 10.11.6, 10.12.x prior to 10.12.6, or is not macOS 10.13. It is, therefore, affected by multiple vulnerabilities in the following components :

- apache
- AppSandbox
- AppleScript
- Application Firewall
- ATS
- Audio
- CFNetwork
- CFNetwork Proxies
- CFString
- Captive Network Assistant
- CoreAudio
- CoreText
- DesktopServices
- Directory Utility
- file
- Fonts
- fsck_msdos
- HFS
- Heimdal
- HelpViewer
- IOFireWireFamily
- ImageIO
- Installer
- Kernel
- kext tools
- libarchive
- libc
- libexpat
- Mail
- Mail Drafts
- ntp
- Open Scripting Architecture
- PCRE
- Postfix
- Quick Look
- QuickTime
- Remote Management
- SQLite
- Sandbox
- Screen Lock
- Security
- Spotlight
- WebKit
- zlib

Note that successful exploitation of the most serious issues can result in arbitrary code execution.

Solution

Upgrade to macOS version 10.13 or later.

See Also

https://support.apple.com/en-us/HT208144

https://support.apple.com/en-us/HT208165

http://www.nessus.org/u?9cfca404

Plugin Details

Severity: Critical

ID: 103598

File Name: macos_10_13.nasl

Version: 1.9

Type: combined

Agent: macosx

Published: 2017/10/03

Updated: 2018/07/14

Dependencies: 11936, 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x, cpe:/o:apple:macos

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/09/25

Vulnerability Publication Date: 2017/09/25

Reference Information

CVE: CVE-2016-0736, CVE-2016-2161, CVE-2016-4736, CVE-2016-5387, CVE-2016-8740, CVE-2016-8743, CVE-2016-9042, CVE-2016-9063, CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843, CVE-2017-0381, CVE-2017-3167, CVE-2017-3169, CVE-2017-6451, CVE-2017-6452, CVE-2017-6455, CVE-2017-6458, CVE-2017-6459, CVE-2017-6460, CVE-2017-6462, CVE-2017-6463, CVE-2017-6464, CVE-2017-7074, CVE-2017-7077, CVE-2017-7078, CVE-2017-7080, CVE-2017-7082, CVE-2017-7083, CVE-2017-7084, CVE-2017-7086, CVE-2017-7114, CVE-2017-7119, CVE-2017-7121, CVE-2017-7122, CVE-2017-7123, CVE-2017-7124, CVE-2017-7125, CVE-2017-7126, CVE-2017-7127, CVE-2017-7128, CVE-2017-7129, CVE-2017-7130, CVE-2017-7132, CVE-2017-7138, CVE-2017-7141, CVE-2017-7143, CVE-2017-7144, CVE-2017-7149, CVE-2017-7150, CVE-2017-7659, CVE-2017-7668, CVE-2017-7679, CVE-2017-9233, CVE-2017-9788, CVE-2017-9789, CVE-2017-10140, CVE-2017-10989, CVE-2017-11103, CVE-2017-13782, CVE-2017-13807, CVE-2017-13808, CVE-2017-13809, CVE-2017-13810, CVE-2017-13811, CVE-2017-13812, CVE-2017-13813, CVE-2017-13814, CVE-2017-13815, CVE-2017-13816, CVE-2017-13817, CVE-2017-13818, CVE-2017-13819, CVE-2017-13820, CVE-2017-13821, CVE-2017-13822, CVE-2017-13823, CVE-2017-13824, CVE-2017-13825, CVE-2017-13827, CVE-2017-13828, CVE-2017-13829, CVE-2017-13830, CVE-2017-13831, CVE-2017-13832, CVE-2017-13833, CVE-2017-13834, CVE-2017-13836, CVE-2017-13837, CVE-2017-13838, CVE-2017-13839, CVE-2017-13840, CVE-2017-13841, CVE-2017-13842, CVE-2017-13843, CVE-2017-13846, CVE-2017-13850, CVE-2017-13851, CVE-2017-13853, CVE-2017-13854, CVE-2017-13873, CVE-2017-1000373

BID: 91816, 93055, 94337, 94650, 95076, 95077, 95078, 95131, 95248, 97045, 97046, 97049, 97050, 97051, 97052, 97058, 97074, 97076, 97078, 97201, 99132, 99134, 99135, 99137, 99170, 99177, 99276, 99502, 99551, 99568, 99569, 100987, 100990, 100991, 100992, 100993, 100999, 102100

APPLE-SA: APPLE-SA-2017-09-25-1