Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Apple MacOSX Security Updates(HT208331)-02
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Apple Mac OS X and is prone to multiple vulnerabilities.
Insight
Insight
The Security update includes, - A validation issue was addressed with improved input sanitization. - An out-of-bounds read issue existed in X.509 IPAddressFamily parsing. - A type confusion issue was addressed with improved memory handling. - A memory corruption issue was addressed with improved memory handling. - Multiple issues were addressed by updating to version 2.4.28. - Multiple memory corruption issues were addressed through improved state management. - An out-of-bounds read was addressed with improved bounds checking. - An out-of-bounds read issue existed in the FTP PWD response parsing. - An integer overflow error. - An input validation issue existed in the kernel.
Affected Software
Affected Software
Apple Mac OS X versions, 10.13.x through 10.13.1, 10.12.x through 10.12.6, 10.11.x through 10.11.6
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Apply the appropriate security patch from the reference links.