Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Apple MacOSX Security Updates(HT208331)-02

Information

Severity

Severity

Critical

Family

Family

Mac OS X Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

6 years ago

Modified

Modified

5 years ago

Summary

This host is installed with Apple Mac OS X and is prone to multiple vulnerabilities.

Insight

Insight

The Security update includes, - A validation issue was addressed with improved input sanitization. - An out-of-bounds read issue existed in X.509 IPAddressFamily parsing. - A type confusion issue was addressed with improved memory handling. - A memory corruption issue was addressed with improved memory handling. - Multiple issues were addressed by updating to version 2.4.28. - Multiple memory corruption issues were addressed through improved state management. - An out-of-bounds read was addressed with improved bounds checking. - An out-of-bounds read issue existed in the FTP PWD response parsing. - An integer overflow error. - An input validation issue existed in the kernel.

Affected Software

Affected Software

Apple Mac OS X versions, 10.13.x through 10.13.1, 10.12.x through 10.12.6, 10.11.x through 10.11.6

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Apply the appropriate security patch from the reference links.