Mac OS X Multiple Vulnerabilities (Security Update 2015-005) (GHOST) (Logjam)

critical Nessus Plugin ID 84489

Synopsis

The remote host is missing a Mac OS X update that fixes multiple security vulnerabilities.

Description

The remote host is running a version of Mac OS X 10.8.5 or 10.9.5 that is missing Security Update 2015-005. It is, therefore, affected multiple vulnerabilities in the following components :

- Admin Framework
- afpserver
- apache
- AppleFSCompression
- AppleGraphicsControl
- AppleThunderboltEDMService
- ATS
- Bluetooth
- Certificate Trust Policy
- CFNetwork HTTPAuthentication
- CoreText
- coreTLS
- DiskImages
- Display Drivers
- EFI
- FontParser
- Graphics Driver
- ImageIO
- Install Framework Legacy
- Intel Graphics Driver
- IOAcceleratorFamily
- IOFireWireFamily
- Kernel
- kext tools
- Mail
- ntfs
- ntp
- OpenSSL
- QuickTime
- Security
- Spotlight
- SQLite
- System Stats
- TrueTypeScaler
- zip

Note that successful exploitation of the most serious issues can result in arbitrary code execution.

Solution

Install Security Update 2015-005 or later.

See Also

https://support.apple.com/en-ca/HT204942

http://www.nessus.org/u?956357d4

http://www.nessus.org/u?c7a6ddbd

https://weakdh.org/

Plugin Details

Severity: Critical

ID: 84489

File Name: macosx_SecUpd2015-005.nasl

Version: 1.21

Type: local

Agent: macosx

Published: 7/1/2015

Updated: 12/5/2022

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.8

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/30/2015

Vulnerability Publication Date: 6/30/2015

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Apple OS X Entitlements Rootpipe Privilege Escalation)

Reference Information

CVE: CVE-2015-0209, CVE-2015-0235, CVE-2015-0273, CVE-2015-0286, CVE-2015-0287, CVE-2015-0288, CVE-2015-0289, CVE-2015-0293, CVE-2015-1157, CVE-2015-1798, CVE-2015-1799, CVE-2015-3661, CVE-2015-3662, CVE-2015-3663, CVE-2015-3666, CVE-2015-3667, CVE-2015-3668, CVE-2015-3671, CVE-2015-3672, CVE-2015-3673, CVE-2015-3674, CVE-2015-3675, CVE-2015-3676, CVE-2015-3677, CVE-2015-3678, CVE-2015-3679, CVE-2015-3680, CVE-2015-3681, CVE-2015-3682, CVE-2015-3683, CVE-2015-3684, CVE-2015-3685, CVE-2015-3686, CVE-2015-3687, CVE-2015-3688, CVE-2015-3689, CVE-2015-3690, CVE-2015-3691, CVE-2015-3692, CVE-2015-3693, CVE-2015-3694, CVE-2015-3695, CVE-2015-3696, CVE-2015-3697, CVE-2015-3698, CVE-2015-3699, CVE-2015-3700, CVE-2015-3701, CVE-2015-3702, CVE-2015-3703, CVE-2015-3704, CVE-2015-3705, CVE-2015-3706, CVE-2015-3707, CVE-2015-3708, CVE-2015-3709, CVE-2015-3710, CVE-2015-3711, CVE-2015-3712, CVE-2015-3713, CVE-2015-3714, CVE-2015-3715, CVE-2015-3716, CVE-2015-3717, CVE-2015-3718, CVE-2015-3719, CVE-2015-3720, CVE-2015-3721, CVE-2015-4000

BID: 72325, 72701, 73225, 73227, 73231, 73232, 73237, 73239, 73950, 73951, 74733

APPLE-SA: APPLE-SA-2015-06-30-2

CERT: 967332