macOS 10.14.x < 10.14.6 Security Update 2020-007 / 10.15.x < 10.15.7 Security Update 2020-001 / macOS 11.x < 11.1 (HT212011)

high Nessus Plugin ID 144453

Synopsis

The remote host is missing a macOS security update.

Description

The remote host is running a version of macOS / Mac OS X that is 10.14.x prior to 10.14.6 Security Update 2020-007 Mojave, 10.15.x prior to 10.15.7 Security Update 2020-001 Catalina, or 11.x prior to 11.1. It is, therefore, affected by multiple vulnerabilities, including the following:

- Processing a maliciously crafted audio file may lead to arbitrary code execution. (CVE-2020-9960, CVE-2020-10017, CVE-2020-27908, CVE-2020-27910, CVE-2020-27916, CVE-2020-27948)

- Processing a maliciously crafted image may lead to arbitrary code execution. (CVE-2020-9962, CVE-2020-27912, CVE-2020-27919, CVE-2020-27923, CVE-2020-27924, CVE-2020-29611, CVE-2020-29616, CVE-2020-29618)

- Processing a maliciously crafted font file may lead to arbitrary code execution. (CVE-2020-9956, CVE-2020-27922, CVE-2020-27931, CVE-2020-27943, CVE-2020-27944, CVE-2020-27952)

Note that Nessus has not tested for this issue but has instead relied only on the operating system's self-reported version number.

Solution

Upgrade to macOS 10.14.6 Security Update 2020-007 / 10.15.7 Security Update 2020-001 / macOS 11.1 or later.

See Also

https://support.apple.com/en-us/HT212011

Plugin Details

Severity: High

ID: 144453

File Name: macos_HT212011.nasl

Version: 1.4

Type: local

Agent: macosx

Published: 12/18/2020

Updated: 5/11/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2020-9975

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2020-27920

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x, cpe:/o:apple:macos

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/14/2020

Vulnerability Publication Date: 12/14/2020

Reference Information

CVE: CVE-2020-10002, CVE-2020-10004, CVE-2020-10007, CVE-2020-10009, CVE-2020-10010, CVE-2020-10012, CVE-2020-10014, CVE-2020-10015, CVE-2020-10016, CVE-2020-10017, CVE-2020-13524, CVE-2020-15969, CVE-2020-27896, CVE-2020-27897, CVE-2020-27898, CVE-2020-27901, CVE-2020-27903, CVE-2020-27906, CVE-2020-27907, CVE-2020-27908, CVE-2020-27910, CVE-2020-27911, CVE-2020-27912, CVE-2020-27914, CVE-2020-27915, CVE-2020-27916, CVE-2020-27919, CVE-2020-27920, CVE-2020-27921, CVE-2020-27922, CVE-2020-27923, CVE-2020-27924, CVE-2020-27926, CVE-2020-27931, CVE-2020-27941, CVE-2020-27943, CVE-2020-27944, CVE-2020-27946, CVE-2020-27947, CVE-2020-27948, CVE-2020-27949, CVE-2020-27952, CVE-2020-29611, CVE-2020-29612, CVE-2020-29616, CVE-2020-29617, CVE-2020-29618, CVE-2020-29619, CVE-2020-29620, CVE-2020-29621, CVE-2020-9943, CVE-2020-9944, CVE-2020-9956, CVE-2020-9960, CVE-2020-9962, CVE-2020-9967, CVE-2020-9974, CVE-2020-9975, CVE-2020-9978

APPLE-SA: APPLE-SA-2020-12-14, HT212011

IAVA: 2020-A-0576-S