macOS 10.12.x < 10.12.2 Multiple Vulnerabilities

high Nessus Plugin ID 95917
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host is missing a macOS update that fixes multiple security vulnerabilities.

Description

The remote host is running a version of macOS that is 10.12.x prior to 10.12.2. It is, therefore, affected by multiple vulnerabilities in the following components :

- apache_mod_php
- AppleGraphicsPowerManagement
- Assets
- Audio
- Bluetooth
- CoreCapture
- CoreFoundation
- CoreGraphics
- CoreMedia External Displays
- CoreMedia Playback
- CoreStorage
- CoreText
- curl
- Directory Services
- Disk Images
- FontParser
- Foundation
- Grapher
- ICU
- ImageIO
- Intel Graphics Driver
- IOFireWireFamily
- IOAcceleratorFamily
- IOHIDFamily
- IOKit
- IOSurface
- Kernel
- kext tools
- libarchive
- LibreSSL
- OpenLDAP
- OpenPAM
- OpenSSL
- Power Management
- Security
- syslog
- WiFi
- xar

Note that successful exploitation of the most serious issues can result in arbitrary code execution.

Furthermore, CVE-2016-6304, CVE-2016-7596, and CVE-2016-7604 also affect Mac OS X versions 10.10.5 and 10.11.6. However, this plugin does not check those versions.

Solution

Upgrade to macOS version 10.12.2 or later.

See Also

https://support.apple.com/en-us/HT207423

http://www.nessus.org/u?38dabd46

Plugin Details

Severity: High

ID: 95917

File Name: macos_10_12_2.nasl

Version: 1.9

Type: combined

Agent: macosx

Published: 12/16/2016

Updated: 1/7/2020

Dependencies: ssh_get_info.nasl, os_fingerprint.nasl

Risk Information

CVSS Score Source: CVE-2016-7644

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:macos

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/13/2016

Vulnerability Publication Date: 3/21/2016

Reference Information

CVE: CVE-2016-1777, CVE-2016-1823, CVE-2016-4688, CVE-2016-4691, CVE-2016-4693, CVE-2016-5419, CVE-2016-5420, CVE-2016-5421, CVE-2016-6303, CVE-2016-6304, CVE-2016-7141, CVE-2016-7167, CVE-2016-7411, CVE-2016-7412, CVE-2016-7413, CVE-2016-7414, CVE-2016-7416, CVE-2016-7417, CVE-2016-7418, CVE-2016-7588, CVE-2016-7591, CVE-2016-7594, CVE-2016-7595, CVE-2016-7596, CVE-2016-7600, CVE-2016-7602, CVE-2016-7603, CVE-2016-7604, CVE-2016-7605, CVE-2016-7606, CVE-2016-7607, CVE-2016-7608, CVE-2016-7609, CVE-2016-7612, CVE-2016-7615, CVE-2016-7616, CVE-2016-7617, CVE-2016-7618, CVE-2016-7619, CVE-2016-7620, CVE-2016-7621, CVE-2016-7622, CVE-2016-7624, CVE-2016-7625, CVE-2016-7627, CVE-2016-7628, CVE-2016-7629, CVE-2016-7633, CVE-2016-7636, CVE-2016-7637, CVE-2016-7643, CVE-2016-7644, CVE-2016-7655, CVE-2016-7657, CVE-2016-7658, CVE-2016-7659, CVE-2016-7660, CVE-2016-7661, CVE-2016-7662, CVE-2016-7663, CVE-2016-7714, CVE-2016-7742, CVE-2016-7761, CVE-2016-8615, CVE-2016-8616, CVE-2016-8617, CVE-2016-8618, CVE-2016-8619, CVE-2016-8620, CVE-2016-8621, CVE-2016-8622, CVE-2016-8623, CVE-2016-8624, CVE-2016-8625

BID: 85054, 90698, 92292, 92306, 92309, 92754, 92975, 92984, 93004, 93005, 93006, 93007, 93008, 93009, 93011, 93150, 94094, 94096, 94097, 94098, 94100, 94101, 94102, 94103, 94105, 94106, 94107, 94572, 94903, 94904, 94905, 94906

APPLE-SA: APPLE-SA-2016-12-13-1