Mac OS X 10.9.5 or later < 10.11.1 Multiple Vulnerabilities

critical Nessus Network Monitor Plugin ID 9324


The remote host is missing a critical Mac OS X patch update.


The remote host is running a version of Mac OS X version 10.11.x prior to 10.11.1 and is affected by multiple vulnerabilities in the following components :

- Accelerate Framework (CVE-2015-5940)
- apache_mod_php (CVE-2015-0235, CVE-2015-0273, CVE-2015-6834, CVE-2015-6835, CVE-2015-6836, CVE-2015-6837, CVE-2015-6838)
- ATS (CVE-2015-6985)
- Audio (CVE-2015-5933, CVE-2015-5934, CVE-2015-7003)
- Bom (CVE-2015-7006)
- CFNetwork (CVE-2015-7023)
- configd (CVE-2015-7015)
- CoreGraphics (CVE-2015-5925, CVE-2015-5926)
- CoreText (CVE-2015-5944, CVE-2015-6975, CVE-2015-6992, CVE-2015-7017)
- Directory Utility (CVE-2015-6980)
- Disk Images (CVE-2015-6995)
- EFI (CVE-2015-7035)
- File Bookmark (CVE-2015-6987)
- FontParser (CVE-2015-5927, CVE-2015-5942, CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6990, CVE-2015-6991, CVE-2015-6993, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, CVE-2015-7018)
- Grand Central Dispatch (CVE-2015-6989)
- Graphics Drivers (CVE-2015-7019, CVE-2015-7020, CVE-2015-7021)
- ImageIO (CVE-2015-5935, CVE-2015-5936, CVE-2015-5937, CVE-2015-5938, CVE-2015-5939)
- IOAcceleratorFamily (CVE-2015-6996)
- IOHIDFamily (CVE-2015-6974)
- Kernel (CVE-2015-5932, CVE-2015-6988, CVE-2015-6994)
- libarchive (CVE-2015-6984)
- MCX Application Restrictions (CVE-2015-7016)
- Net-SNMP (CVE-2014-3565, CVE-2012-6151)
- OpenGL (CVE-2015-5924)
- OpenSSH (CVE-2015-6563)
- Sandbox (CVE-2015-5945)
- Script Editor (CVE-2015-7007)
- Security (CVE-2015-6983, CVE-2015-7024)
- SecurityAgent (CVE-2015-5943)

Note that successful exploitation of the most serious issues can result in arbitrary code execution.


Upgrade to Mac OS X 10.11.1 or later.

See Also

Plugin Details

Severity: Critical

ID: 9324

Published: 5/27/2016

Updated: 3/6/2019

Nessus ID: 86654

Risk Information


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:mac_os_x

Patch Publication Date: 1/16/2016

Vulnerability Publication Date: 9/16/2015

Exploitable With

Metasploit (Safari User-Assisted Applescript Exec Attack)

Reference Information

CVE: CVE-2012-6151, CVE-2014-3565, CVE-2015-0235, CVE-2015-0273, CVE-2015-5924, CVE-2015-5925, CVE-2015-5926, CVE-2015-5927, CVE-2015-5932, CVE-2015-5933, CVE-2015-5934, CVE-2015-5935, CVE-2015-5936, CVE-2015-5937, CVE-2015-5938, CVE-2015-5939, CVE-2015-5940, CVE-2015-5942, CVE-2015-5943, CVE-2015-5944, CVE-2015-5945, CVE-2015-6563, CVE-2015-6834, CVE-2015-6835, CVE-2015-6836, CVE-2015-6837, CVE-2015-6838, CVE-2015-6974, CVE-2015-6975, CVE-2015-6976, CVE-2015-6977, CVE-2015-6978, CVE-2015-6980, CVE-2015-6983, CVE-2015-6984, CVE-2015-6985, CVE-2015-6987, CVE-2015-6988, CVE-2015-6989, CVE-2015-6990, CVE-2015-6991, CVE-2015-6992, CVE-2015-6993, CVE-2015-6994, CVE-2015-6995, CVE-2015-6996, CVE-2015-7003, CVE-2015-7006, CVE-2015-7007, CVE-2015-7008, CVE-2015-7009, CVE-2015-7010, CVE-2015-7015, CVE-2015-7016, CVE-2015-7017, CVE-2015-7018, CVE-2015-7019, CVE-2015-7020, CVE-2015-7021, CVE-2015-7023, CVE-2015-7024, CVE-2015-7035

BID: 64048, 69477, 72325, 72701, 74971, 76317, 76644, 76649, 76733, 76734, 76738, 77263, 77265, 77266, 77270