Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Apple MacOSX Security Updates(HT211100)-01

Information

Severity

Severity

Critical

Family

Family

Mac OS X Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

4 years ago

Modified

Modified

3 years ago

Summary

This host is installed with Apple Mac OS X and is prone to multiple vulnerabilities.

Insight

Insight

Multiple flaws exists due to, - An out-of-bounds read issue due to improper input validation. - A memory corruption issue due to improper input validation. - Multiple memory corruption issues due to improper state management. - Multiple buffer overflow issues due to improper bounds checking and size validation. - A memory initialization issue due to improper memory handling.

Affected Software

Affected Software

Apple Mac OS X versions 10.13.x through 10.13.6, 10.14.x through 10.14.6, and 10.15.x through 10.15.3

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Apply Security Update 2020-002 for Apple Mac OS X version 10.13.x and 10.14.x, or upgrade to 10.15.4 or later. Please see the references for more information.