Mac OS X : OS X Server < 5.0.15 Multiple Vulnerabilities

High Nessus Plugin ID 86604


The remote host is missing a security update for OS X Server.


The remote Mac OS X host has a version of OS X Server installed that is prior to 5.0.15. It is, therefore, affected by the following vulnerabilities :

- A denial of service vulnerability exists due to an assertion flaw that is triggered when parsing malformed DNSSEC keys. An unauthenticated, remote attacker can exploit this, via a specially crafted query to a zone containing such a key, to cause a validating resolver to exit. (CVE-2015-5722)

- A denial of service vulnerability exists in the fromwire_openpgpkey() function in openpgpkey_61.c that is triggered when the length of data is less than 1. An unauthenticated, remote attacker can exploit this, via a specially crafted response to a query, to cause an assertion failure that terminates named. (CVE-2015-5986)

- A flaw exists in the web service component due to HTTP header field references missing from configuration files.
A remote attacker can exploit this to bypass access restrictions. (CVE-2015-7031)


Upgrade to Mac OS X Server version 5.0.15 or later.

Note that OS X Server 5.0.15 is available only for OS X 10.10.5 and OS X 10.11.1 or later.

See Also

Plugin Details

Severity: High

ID: 86604

File Name: macosx_server_5_0_15.nasl

Version: 1.7

Type: local

Agent: macosx

Published: 2015/10/26

Updated: 2018/07/14

Dependencies: 50680

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x_server, cpe:/a:isc:bind

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, MacOSX/Server/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/10/21

Vulnerability Publication Date: 2015/08/07

Reference Information

CVE: CVE-2015-5722, CVE-2015-5986, CVE-2015-7031

BID: 76605, 76618

APPLE-SA: APPLE-SA-2015-10-21-8