Mac OS X < 10.10.2 Multiple Vulnerabilities

critical Nessus Network Monitor Plugin ID 8644
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host is missing a critical Mac OS X patch update.

Description

The remote host is running a version of Mac OS X 10.10.x that is prior to version 10.10.2. Mac OS X 10.10.2 contains the following security-related fixes :

- The IOHIDFamily allows attackers to execute arbitrary code in a kernel context. (CVE-2014-8822, CVE-2014-4487)
- The LaunchServices module does not properly handle file-type metadata. This can allow an attacker to bypass the Gatekeeper protection via a crafted JAR archive. (CVE-2014-8826)
- There are unspecified vulnerabilities in the Intel Graphics driver. (CVE-2014-8819, CVE-2014-8820, CVE-2014-8821)
- There is a data leak vulnerability in the LoginWindow component. (CVE-2014-8827)
- There is a data leak vulnerability with the Spotlight Mail component. (CVE-2014-8839)
- The SceneKit component is vulnerable to a heap-based buffer overflow. (CVE-2014-8830)
- The App Store process in CommerceKit Framework is vulnerable to a local information leak. (CVE-2014-4499)
- The indexing functionality in Spotlight is vulnerable to a sensitive data leak. (CVE-2014-8832, CVE-2014-8833)
- The security_taskgate Bluetooth driver is vulnerable to an unspecified vulnerability. (CVE-2014-8831)
- The Bluetooth driver is vulnerable to a remote code execution vulnerability. (CVE-2014-8836)
- There are multiple unspecified vulnerabilities in the Bluetooth driver. (CVE-2014-8837, CVE-2014-4497)
- The UserAccountUpdater component is vulnerable to a local data leak. (CVE-2014-8834)
- There is a buffer overflow vulnerability in the xpc_data_get_bytes function in libxpc. (CVE-2014-8835)
- The SceneKit component is vulnerable to an arbitrary code execution vulnerability. (CVE-2014-8829)
- The CPU Software allows a local, physical, firmware attack. (CVE-2014-4498)
- The IOUSBControllerUserClient::ReadRegister function in the IOUSB controller of IOUSBFamily is vulnerable to a data leak. (CVE-2014-8823)
- The kernel does not properly validate IODataQueue object metadata fields. (CVE-2014-8824)
- The kernel does not properly perform identitysvc validation. (CVE-2014-8825)
- The Coresymbolicationd component in CoreSymbolication does not verify data types. (CVE-2014-8817)
- There is an integer overflow in the CoreGraphics component which can lead to remote code execution. (CVE-2014-4481)
- There is a buffer overflow in the FontParser component which may allow remote code execution. (CVE-2014-4483)
- The FontParser does not properly validate crafted .dfont files which can lead to remote code execution. (CVE-2014-4484)
- There is a buffer overflow in the XML parser in Foundation. (CVE-2014-4485)
- The IOAcceleratorFamily does not properly handle certain types and can lead to a NULL pointer dereference. (CVE-2014-4486)
- The IOHIDFamily does not properly validate resource-queue metadata, potentially allowing remote code execution. (CVE-2014-4488)
- The IOHIDFamily fails to properly sanitize event queues. This can lead to remote code execution. (CVE-2014-4489)
- The Kernel extension API is vulnerable to a bypass of the ASLR protection mechanism. (CVE-2014-4491)
- The kernel does not enforce read-only attributes which can allow attackers to bypass access restrictions. (CVE-2014-4495)
- The libnetcore module fails to verify certain data types which can allow remote code execution in the _networkd context. (CVE-2014-4492)

Solution

Upgrade to Mac OS X 10.10.2 or later.

See Also

https://support.apple.com/en-us/HT204244

Plugin Details

Severity: Critical

ID: 8644

Published: 3/4/2015

Updated: 3/6/2019

Dependencies: 4435

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*

Patch Publication Date: 1/30/2015

Vulnerability Publication Date: 1/30/2015

Reference Information

CVE: CVE-2014-8830, CVE-2014-8826, CVE-2014-8836, CVE-2014-4492, CVE-2014-8835, CVE-2014-4481, CVE-2014-4483, CVE-2014-4484, CVE-2014-4485, CVE-2014-4487, CVE-2014-4488, CVE-2014-4489, CVE-2014-4491, CVE-2014-4495, CVE-2014-4486, CVE-2014-4498, CVE-2014-8834, CVE-2014-8839, CVE-2014-8823, CVE-2014-8824, CVE-2014-8832, CVE-2014-8821, CVE-2014-8819, CVE-2014-8833, CVE-2014-4497, CVE-2014-8837, CVE-2014-4499, CVE-2014-8817, CVE-2014-8820, CVE-2014-8822, CVE-2014-8825, CVE-2014-8827, CVE-2014-8829, CVE-2014-8831

BID: 72328, 72327, 72262, 72341, 71992, 72297, 70249