Mac OS X Multiple EFI Vulnerabilities (EFI Security Update 2015-001)

High Nessus Plugin ID 84565

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 6.7

Synopsis

The remote host is affected by multiple vulnerabilities.

Description

The remote Mac OS X host is running EFI firmware that is affected by multiple vulnerabilities :

- An insufficient locking issue exists, when resuming from sleep states, which allows a local attacker to write to the EFI flash memory by using an crafted application with root privileges. (CVE-2015-3692)

- A flaw exists due to lax restrictions on memory refresh rates, which allows a specially crafted process to corrupt the memory of some DDR3 SDRAM devices by inducing bit flips in page table entries (PTEs), also known as a 'row-hammer attack'. An attacker can exploit this to gain elevated privileges by manipulating the PTEs. (CVE-2015-3693)

Solution

Install Mac EFI Security Update 2015-001.

See Also

https://support.apple.com/en-us/HT204934

Plugin Details

Severity: High

ID: 84565

File Name: macosx_SecUpdEFI2015-001.nasl

Version: 1.7

Type: local

Agent: macosx

Published: 2015/07/07

Updated: 2019/11/22

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 6.7

CVSS Score Source: CVE-2015-3693

CVSS v2.0

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2015/06/30

Vulnerability Publication Date: 2014/06/14

Reference Information

CVE: CVE-2015-3692, CVE-2015-3693

BID: 74971

APPLE-SA: APPLE-SA-2015-06-30-3