Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Apple Mac OS X Multiple Vulnerabilities-01 April-2017

Information

Severity

Severity

Critical

Family

Family

Mac OS X Local Security Checks

CVSSv2 Base

CVSSv2 Base

10.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

5 years ago

Modified

Modified

3 years ago

Summary

This host is running Apple Mac OS X and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exists due to, - The Wiki Server does not specify an explicit character set when serving HTML documents in response to user requests. - Multiple errors in SquirrelMail. - A configuration issue exists in Apple's distribution of Samba, the server used for SMB file sharing. - An input validation error in the Ruby WEBrick HTTP server's handling of error pages. - A buffer overflow exists in libcurl's handling of gzip-compressed web content. - An integer overflow exists in AES and RC4 decryption operations of the crypto library in the KDC server. - Multiple integer overflows in the handling of TIFF files. - A directory traversal issue exists in iChat's handling of inline image transfers. - A symlink following issue exists in Folder Manager. - Multiple errors in Adobe Flash Player plug-in. - An uninitialized memory read issue exists in the CUPS web interface's handling of form variables. - An use after free error exists in cupsd. - A cross-site request forgery issue exists in the CUPS web interface.

Affected Software

Affected Software

Apple Mac OS X and Mac OS X Server version 10.5.8, 10.6 through 10.6.3

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Apply the appropriate security patch from the reference links.