Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.816617 |
Category: | Mac OS X Local Security Checks |
Title: | Apple Mac OS X Security Update (HT210919 - 01) |
Summary: | Apple Mac OS X is prone to multiple vulnerabilities. |
Description: | Summary: Apple Mac OS X is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - Multiple memory corruption issues related to improper memory handling. - A buffer overflow issue related to improper memory handling. - Multiple out-of-bounds read errors related to improper bounds checking and input validation. - An improper permissions logic. - An access issue related to improper memory management. - A validation issue existed in the handling of symlinks. - A validation issue related to insufficient input sanitization. - A type confusion issue related to improper memory handling. Vulnerability Impact: Successful exploitation allows attackers to execute arbitrary code with kernel privileges, cause unexpected system termination or corrupt kernel memory, gain elevated privileges, determine kernel memory layout, access restricted files and overwrite arbitrary files. Affected Software/OS: Apple Mac OS X versions, 10.13.x through 10.13.6, 10.14.x through 10.14.6, 10.15.x through 10.15.2 Solution: Apply Security Update 2020-001 for 10.13.x, and 10.14.x and upgrade to Apple Mac OS X 10.15.3 or later for 10.15.x. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-3842 https://support.apple.com/HT210918 https://support.apple.com/HT210919 https://support.apple.com/HT210920 https://support.apple.com/HT210921 Common Vulnerability Exposure (CVE) ID: CVE-2020-3871 Common Vulnerability Exposure (CVE) ID: CVE-2020-3827 Common Vulnerability Exposure (CVE) ID: CVE-2020-3843 http://packetstormsecurity.com/files/162119/iOS-macOS-Radio-Proximity-Kernel-Memory-Corruption.html https://support.apple.com/HT211169 https://support.apple.com/HT211176 Common Vulnerability Exposure (CVE) ID: CVE-2020-3829 Common Vulnerability Exposure (CVE) ID: CVE-2020-3826 https://support.apple.com/HT210947 https://support.apple.com/HT210948 Common Vulnerability Exposure (CVE) ID: CVE-2020-3870 Common Vulnerability Exposure (CVE) ID: CVE-2020-3878 https://support.apple.com/HT211168 https://support.apple.com/HT211170 https://support.apple.com/HT211171 https://support.apple.com/HT211175 https://support.apple.com/HT211178 https://support.apple.com/HT211179 https://support.apple.com/HT211181 Common Vulnerability Exposure (CVE) ID: CVE-2020-3838 http://seclists.org/fulldisclosure/2021/Apr/51 http://seclists.org/fulldisclosure/2021/Apr/54 Common Vulnerability Exposure (CVE) ID: CVE-2020-3836 Common Vulnerability Exposure (CVE) ID: CVE-2020-3835 Common Vulnerability Exposure (CVE) ID: CVE-2020-3830 Common Vulnerability Exposure (CVE) ID: CVE-2020-3875 Common Vulnerability Exposure (CVE) ID: CVE-2020-3856 Common Vulnerability Exposure (CVE) ID: CVE-2020-3853 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |