Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Apple MacOSX Security Updates(HT208692)-01

Information

Severity

Severity

Critical

Family

Family

Mac OS X Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

5 years ago

Modified

Modified

4 years ago

Summary

This host is installed with Apple Mac OS X and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exists due to, - An injection issue due to improper input validation. - An issue existed in the parsing of URLs in PDFs due to improper input validation. - An out-of-bounds read error. - An inconsistent user interface issue. - By scanning key states, an unprivileged application could log keystrokes entered into other applications even when secure input mode was enabled. - An issue existed in the handling of S/MIME HTML e-mail. - The sysadminctl command-line tool required that passwords be passed to it in its arguments, potentially exposing the passwords to other local users. - An issue existed in CFPreferences. - Multiple memory corruption issues. - A validation issue. - A consistency issue existed in deciding when to show the microphone use indicator.

Affected Software

Affected Software

Apple Mac OS X versions 10.13.x through 10.13.3

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to Apple Mac OS X 10.13.4 or later. Please see the references for more information.