ID CVE-2015-5922 Type cve Reporter cve@mitre.org Modified 2019-04-23T19:29:00
Description
Unspecified vulnerability in International Components for Unicode (ICU) before 53.1.0, as used in Apple OS X before 10.11 and watchOS before 2, has unknown impact and attack vectors.
{"openvas": [{"lastseen": "2019-07-17T14:26:51", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-5883", "CVE-2015-5877", "CVE-2015-3785", "CVE-2015-5922", "CVE-2015-5865", "CVE-2015-5888", "CVE-2015-5872", "CVE-2015-5873", "CVE-2015-5875", "CVE-2015-5870", "CVE-2015-5913", "CVE-2015-5894", "CVE-2015-7760", "CVE-2015-5878", "CVE-2015-5871", "CVE-2015-5866", "CVE-2015-5901", "CVE-2015-5884", "CVE-2015-5889", "CVE-2015-5836", "CVE-2015-5915", "CVE-2015-5900", "CVE-2015-5890", "CVE-2015-5854", "CVE-2015-5893", "CVE-2015-5917", "CVE-2015-7761", "CVE-2015-5887", "CVE-2015-5902", "CVE-2015-5853", "CVE-2015-5897", "CVE-2015-5830", "CVE-2015-5849", "CVE-2015-5833", "CVE-2015-5864", "CVE-2015-5891", "CVE-2015-5914"], "description": "This host is running Apple Mac OS X and\n is prone to multiple vulnerabilities.", "modified": "2019-07-05T00:00:00", "published": "2015-10-29T00:00:00", "id": "OPENVAS:1361412562310806154", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806154", "type": "openvas", "title": "Apple Mac OS X Multiple Vulnerabilities-02 October-15", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Apple Mac OS X Multiple Vulnerabilities-02 October-15\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806154\");\n script_version(\"2019-07-05T09:12:25+0000\");\n script_cve_id(\"CVE-2015-7761\", \"CVE-2015-7760\", \"CVE-2015-5922\", \"CVE-2015-5917\",\n \"CVE-2015-5915\", \"CVE-2015-5914\", \"CVE-2015-5913\", \"CVE-2015-5902\",\n \"CVE-2015-5901\", \"CVE-2015-5900\", \"CVE-2015-5897\", \"CVE-2015-5894\",\n \"CVE-2015-5893\", \"CVE-2015-5891\", \"CVE-2015-5890\", \"CVE-2015-5889\",\n \"CVE-2015-5888\", \"CVE-2015-5887\", \"CVE-2015-5884\", \"CVE-2015-5883\",\n \"CVE-2015-5878\", \"CVE-2015-5877\", \"CVE-2015-5875\", \"CVE-2015-5873\",\n \"CVE-2015-5872\", \"CVE-2015-5871\", \"CVE-2015-5870\", \"CVE-2015-5866\",\n \"CVE-2015-5865\", \"CVE-2015-5864\", \"CVE-2015-5854\", \"CVE-2015-5853\",\n \"CVE-2015-5849\", \"CVE-2015-5836\", \"CVE-2015-5833\", \"CVE-2015-5830\",\n \"CVE-2015-3785\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-07-05 09:12:25 +0000 (Fri, 05 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-10-29 13:24:34 +0530 (Thu, 29 Oct 2015)\");\n script_name(\"Apple Mac OS X Multiple Vulnerabilities-02 October-15\");\n\n script_tag(name:\"summary\", value:\"This host is running Apple Mac OS X and\n is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists. For details refer\n reference section.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attacker\n to obtain sensitive information, execute arbitrary code, bypass intended launch\n restrictions and access restrictions, cause a denial of service, write to\n arbitrary files, execute arbitrary code with system privilege.\");\n\n script_tag(name:\"affected\", value:\"Apple Mac OS X versions 10.6.8 through\n 10.11\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Apple Mac OS X version\n 10.11 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://support.apple.com/en-us/HT205267\");\n script_xref(name:\"URL\", value:\"http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Mac OS X Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/osx_name\", \"ssh/login/osx_version\", re:\"ssh/login/osx_version=^10\\.([6-9|10)\\.\");\n\n exit(0);\n}\n\ninclude(\"version_func.inc\");\n\nosName = get_kb_item(\"ssh/login/osx_name\");\nif(!osName)\n exit(0);\n\nosVer = get_kb_item(\"ssh/login/osx_version\");\nif(!osVer)\n exit(0);\n\nif(\"Mac OS X\" >< osName)\n{\n if(version_in_range(version:osVer, test_version:\"10.6.8\", test_version2:\"10.10.5\"))\n {\n report = report_fixed_ver(installed_version:osVer, fixed_version:\"10.11\");\n security_message(data:report);\n exit(0);\n }\n exit(99);\n}\n\nexit(0);", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "securityvulns": [{"lastseen": "2018-08-31T11:11:01", "bulletinFamily": "software", "cvelist": ["CVE-2015-2348", "CVE-2014-9705", "CVE-2015-5883", "CVE-2015-2787", "CVE-2015-0232", "CVE-2015-5903", "CVE-2015-0235", "CVE-2015-2783", "CVE-2015-5877", "CVE-2015-3785", "CVE-2015-5847", "CVE-2014-9427", "CVE-2015-3329", "CVE-2015-3415", "CVE-2015-3330", "CVE-2015-5922", "CVE-2015-5865", "CVE-2015-5869", "CVE-2015-5879", "CVE-2015-5876", "CVE-2015-5858", "CVE-2015-5862", "CVE-2015-0286", "CVE-2015-5888", "CVE-2015-5874", "CVE-2015-5860", "CVE-2015-1855", "CVE-2014-3618", "CVE-2015-1352", "CVE-2015-2301", "CVE-2015-5868", "CVE-2015-5872", "CVE-2015-5839", "CVE-2015-5840", "CVE-2014-6277", "CVE-2014-9425", "CVE-2014-9709", "CVE-2015-2305", "CVE-2015-5873", "CVE-2015-0273", "CVE-2015-5875", "CVE-2015-5882", "CVE-2015-5842", "CVE-2015-5912", "CVE-2015-2331", "CVE-2015-5870", "CVE-2015-5913", "CVE-2015-5841", "CVE-2015-5894", "CVE-2015-5881", "CVE-2014-2532", "CVE-2015-5831", "CVE-2014-8147", "CVE-2015-5878", "CVE-2015-5855", "CVE-2014-8611", "CVE-2015-5871", "CVE-2015-5866", "CVE-2015-5901", "CVE-2014-8090", "CVE-2015-5824", "CVE-2015-5884", "CVE-2015-3416", "CVE-2015-5889", "CVE-2015-5867", "CVE-2015-5836", "CVE-2015-5915", "CVE-2015-5900", "CVE-2015-5890", "CVE-2014-7187", "CVE-2014-8146", "CVE-2015-5854", "CVE-2015-3414", "CVE-2014-9652", "CVE-2015-5523", "CVE-2015-5885", "CVE-2013-3951", "CVE-2015-5893", "CVE-2015-5917", "CVE-2014-8080", "CVE-2015-1351", "CVE-2015-5887", "CVE-2015-5902", "CVE-2015-0287", "CVE-2015-5853", "CVE-2015-5897", "CVE-2015-5830", "CVE-2015-5849", "CVE-2015-5896", "CVE-2015-5833", "CVE-2015-5863", "CVE-2015-0231", "CVE-2015-5864", "CVE-2014-7186", "CVE-2015-5891", "CVE-2015-5914", "CVE-2015-5522", "CVE-2015-5851", "CVE-2015-5899"], "description": "\r\n\r\nAPPLE-SA-2015-09-30-3 OS X El Capitan 10.11\r\n\r\nOS X El Capitan 10.11 is now available and addresses the following:\r\n\r\nAddress Book\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local attacker may be able to inject arbitrary code to\r\nprocesses loading the Address Book framework\r\nDescription: An issue existed in Address Book framework's handling\r\nof an environment variable. This issue was addressed through improved\r\nenvironment variable handling.\r\nCVE-ID\r\nCVE-2015-5897 : Dan Bastone of Gotham Digital Science\r\n\r\nAirScan\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An attacker with a privileged network position may be able\r\nto extract payload from eSCL packets sent over a secure connection\r\nDescription: An issue existed in the processing of eSCL packets.\r\nThis issue was addressed through improved validation checks.\r\nCVE-ID\r\nCVE-2015-5853 : an anonymous researcher\r\n\r\napache_mod_php\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Multiple vulnerabilities in PHP\r\nDescription: Multiple vulnerabilities existed in PHP versions prior\r\nto 5.5.27, including one which may have led to remote code execution.\r\nThis issue was addressed by updating PHP to version 5.5.27.\r\nCVE-ID\r\nCVE-2014-9425\r\nCVE-2014-9427\r\nCVE-2014-9652\r\nCVE-2014-9705\r\nCVE-2014-9709\r\nCVE-2015-0231\r\nCVE-2015-0232\r\nCVE-2015-0235\r\nCVE-2015-0273\r\nCVE-2015-1351\r\nCVE-2015-1352\r\nCVE-2015-2301\r\nCVE-2015-2305\r\nCVE-2015-2331\r\nCVE-2015-2348\r\nCVE-2015-2783\r\nCVE-2015-2787\r\nCVE-2015-3329\r\nCVE-2015-3330\r\n\r\nApple Online Store Kit\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A malicious application may gain access to a user's keychain\r\nitems\r\nDescription: An issue existed in validation of access control lists\r\nfor iCloud keychain items. This issue was addressed through improved\r\naccess control list checks.\r\nCVE-ID\r\nCVE-2015-5836 : XiaoFeng Wang of Indiana University, Luyi Xing of\r\nIndiana University, Tongxin Li of Peking University, Tongxin Li of\r\nPeking University, Xiaolong Bai of Tsinghua University\r\n\r\nAppleEvents\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A user connected through screen sharing can send Apple\r\nEvents to a local user's session\r\nDescription: An issue existed with Apple Event filtering that\r\nallowed some users to send events to other users. This was addressed\r\nby improved Apple Event handling.\r\nCVE-ID\r\nCVE-2015-5849 : Jack Lawrence (@_jackhl)\r\n\r\nAudio\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Playing a malicious audio file may lead to an unexpected\r\napplication termination\r\nDescription: A memory corruption issue existed in the handling of\r\naudio files. This issue issue was addressed through improved memory\r\nhandling.\r\nCVE-ID\r\nCVE-2015-5862 : YoungJin Yoon of Information Security Lab. (Adv.:\r\nProf. Taekyoung Kwon), Yonsei University, Seoul, Korea\r\n\r\nbash\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Multiple vulnerabilities in bash\r\nDescription: Multiple vulnerabilities existed in bash versions prior\r\nto 3.2 patch level 57. These issues were addressed by updating bash\r\nversion 3.2 to patch level 57.\r\nCVE-ID\r\nCVE-2014-6277\r\nCVE-2014-7186\r\nCVE-2014-7187\r\n\r\nCertificate Trust Policy\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Update to the certificate trust policy\r\nDescription: The certificate trust policy was updated. The complete\r\nlist of certificates may be viewed at https://support.apple.com/en-\r\nus/HT202858.\r\n\r\nCFNetwork Cookies\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An attacker in a privileged network position can track a\r\nuser's activity\r\nDescription: A cross-domain cookie issue existed in the handling of\r\ntop level domains. The issue was address through improved\r\nrestrictions of cookie creation.\r\nCVE-ID\r\nCVE-2015-5885 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua\r\nUniversity\r\n\r\nCFNetwork FTPProtocol\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Malicious FTP servers may be able to cause the client to\r\nperform reconnaissance on other hosts\r\nDescription: An issue existed in the handling of FTP packets when\r\nusing the PASV command. This issue was resolved through improved\r\nvalidation.\r\nCVE-ID\r\nCVE-2015-5912 : Amit Klein\r\n\r\nCFNetwork HTTPProtocol\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A maliciously crafted URL may be able to bypass HSTS and\r\nleak sensitive data\r\nDescription: A URL parsing vulnerability existed in HSTS handling.\r\nThis issue was addressed through improved URL parsing.\r\nCVE-ID\r\nCVE-2015-5858 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua\r\nUniversity\r\n\r\nCFNetwork HTTPProtocol\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A malicious website may be able to track users in Safari\r\nprivate browsing mode\r\nDescription: An issue existed in the handling of HSTS state in\r\nSafari private browsing mode. This issue was addressed through\r\nimproved state handling.\r\nCVE-ID\r\nCVE-2015-5860 : Sam Greenhalgh of RadicalResearch Ltd\r\n\r\nCFNetwork Proxies\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Connecting to a malicious web proxy may set malicious\r\ncookies for a website\r\nDescription: An issue existed in the handling of proxy connect\r\nresponses. This issue was addressed by removing the set-cookie header\r\nwhile parsing the connect response.\r\nCVE-ID\r\nCVE-2015-5841 : Xiaofeng Zheng of Blue Lotus Team, Tsinghua\r\nUniversity\r\n\r\nCFNetwork SSL\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An attacker with a privileged network position may intercept\r\nSSL/TLS connections\r\nDescription: A certificate validation issue existed in NSURL when a\r\ncertificate changed. This issue was addressed through improved\r\ncertificate validation.\r\nCVE-ID\r\nCVE-2015-5824 : Timothy J. Wood of The Omni Group\r\n\r\nCFNetwork SSL\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An attacker may be able to decrypt data protected by SSL\r\nDescription: There are known attacks on the confidentiality of RC4.\r\nAn attacker could force the use of RC4, even if the server preferred\r\nbetter ciphers, by blocking TLS 1.0 and higher connections until\r\nCFNetwork tried SSL 3.0, which only allows RC4. This issue was\r\naddressed by removing the fallback to SSL 3.0.\r\n\r\nCoreCrypto\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An attacker may be able to determine a private key\r\nDescription: By observing many signing or decryption attempts, an\r\nattacker may have been able to determine the RSA private key. This\r\nissue was addressed using improved encryption algorithms.\r\n\r\nCoreText\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Processing a maliciously crafted font file may lead to\r\narbitrary code execution\r\nDescription: A memory corruption issue existed in the processing of\r\nfont files. This issue was addressed through improved input\r\nvalidation.\r\nCVE-ID\r\nCVE-2015-5874 : John Villamil (@day6reak), Yahoo Pentest Team\r\n\r\nDev Tools\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A malicious application may be able to execute arbitrary\r\ncode with system privileges\r\nDescription: A memory corruption issue existed in dyld. This was\r\naddressed through improved memory handling.\r\nCVE-ID\r\nCVE-2015-5876 : beist of grayhash\r\n\r\nDev Tools\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An application may be able to bypass code signing\r\nDescription: An issue existed with validation of the code signature\r\nof executables. This issue was addressed through improved bounds\r\nchecking.\r\nCVE-ID\r\nCVE-2015-5839 : @PanguTeam\r\n\r\nDisk Images\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to execute arbitrary code with\r\nsystem privileges\r\nDescription: A memory corruption issue existed in DiskImages. This\r\nissue was addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2015-5847 : Filippo Bigarella, Luca Todesco\r\n\r\ndyld\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An application may be able to bypass code signing\r\nDescription: An issue existed with validation of the code signature\r\nof executables. This issue was addressed through improved bounds\r\nchecking.\r\nCVE-ID\r\nCVE-2015-5839 : TaiG Jailbreak Team\r\n\r\nEFI\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A malicious application can prevent some systems from\r\nbooting\r\nDescription: An issue existed with the addresses covered by the\r\nprotected range register. This issue was fixed by changing the\r\nprotected range.\r\nCVE-ID\r\nCVE-2015-5900 : Xeno Kovah & Corey Kallenberg from LegbaCore\r\n\r\nEFI\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A malicious Apple Ethernet Thunderbolt adapter may be able\r\nto affect firmware flashing\r\nDescription: Apple Ethernet Thunderbolt adapters could modify the\r\nhost firmware if connected during an EFI update. This issue was\r\naddressed by not loading option ROMs during updates.\r\nCVE-ID\r\nCVE-2015-5914 : Trammell Hudson of Two Sigma Investments and snare\r\n\r\nFinder\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: The "Secure Empty Trash" feature may not securely delete\r\nfiles placed in the Trash\r\nDescription: An issue existed in guaranteeing secure deletion of\r\nTrash files on some systems, such as those with flash storage. This\r\nissue was addressed by removing the "Secure Empty Trash" option.\r\nCVE-ID\r\nCVE-2015-5901 : Apple\r\n\r\nGame Center\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A malicious Game Center application may be able to access a\r\nplayer's email address\r\nDescription: An issue existed in Game Center in the handling of a\r\nplayer's email. This issue was addressed through improved access\r\nrestrictions.\r\nCVE-ID\r\nCVE-2015-5855 : Nasser Alnasser\r\n\r\nHeimdal\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An attacker may be able to replay Kerberos credentials to\r\nthe SMB server\r\nDescription: An authentication issue existed in Kerberos\r\ncredentials. This issue was addressed through additional validation\r\nof credentials using a list of recently seen credentials.\r\nCVE-ID\r\nCVE-2015-5913 : Tarun Chopra of Microsoft Corporation, U.S. and Yu\r\nFan of Microsoft Corporation, China\r\n\r\nICU\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Multiple vulnerabilities in ICU\r\nDescription: Multiple vulnerabilities existed in ICU versions prior\r\nto 53.1.0. These issues were addressed by updating ICU to version\r\n55.1.\r\nCVE-ID\r\nCVE-2014-8146\r\nCVE-2014-8147\r\nCVE-2015-5922\r\n\r\nInstall Framework Legacy\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to gain root privileges\r\nDescription: A restriction issue existed in the Install private\r\nframework containing a privileged executable. This issue was\r\naddressed by removing the executable.\r\nCVE-ID\r\nCVE-2015-5888 : Apple\r\n\r\nIntel Graphics Driver\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to execute arbitrary code with\r\nsystem privileges\r\nDescription: Multiple memory corruption issues existed in the Intel\r\nGraphics Driver. These issues were addressed through improved memory\r\nhandling.\r\nCVE-ID\r\nCVE-2015-5830 : Yuki MIZUNO (@mzyy94)\r\nCVE-2015-5877 : Camillus Gerard Cai\r\n\r\nIOAudioFamily\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to determine kernel memory layout\r\nDescription: An issue existed in IOAudioFamily that led to the\r\ndisclosure of kernel memory content. This issue was addressed by\r\npermuting kernel pointers.\r\nCVE-ID\r\nCVE-2015-5864 : Luca Todesco\r\n\r\nIOGraphics\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to execute arbitrary code with\r\nkernel privileges\r\nDescription: Multiple memory corruption issues existed in the\r\nkernel. These issues were addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2015-5871 : Ilja van Sprundel of IOActive\r\nCVE-2015-5872 : Ilja van Sprundel of IOActive\r\nCVE-2015-5873 : Ilja van Sprundel of IOActive\r\nCVE-2015-5890 : Ilja van Sprundel of IOActive\r\n\r\nIOGraphics\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A malicious application may be able to determine kernel\r\nmemory layout\r\nDescription: An issue existed in IOGraphics which could have led to\r\nthe disclosure of kernel memory layout. This issue was addressed\r\nthrough improved memory management.\r\nCVE-ID\r\nCVE-2015-5865 : Luca Todesco\r\n\r\nIOHIDFamily\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A malicious application may be able to execute arbitrary\r\ncode with system privileges\r\nDescription: Multiple memory corruption issues existed in\r\nIOHIDFamily. These issues were addressed through improved memory\r\nhandling.\r\nCVE-ID\r\nCVE-2015-5866 : Apple\r\nCVE-2015-5867 : moony li of Trend Micro\r\n\r\nIOStorageFamily\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local attacker may be able to read kernel memory\r\nDescription: A memory initialization issue existed in the kernel.\r\nThis issue was addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2015-5863 : Ilja van Sprundel of IOActive\r\n\r\nKernel\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to execute arbitrary code with\r\nkernel privileges\r\nDescription: Multiple memory corruption issues existed in the\r\nKernel. These issues were addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2015-5868 : Cererdlong of Alibaba Mobile Security Team\r\nCVE-2015-5896 : Maxime Villard of m00nbsd\r\nCVE-2015-5903 : CESG\r\n\r\nKernel\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local process can modify other processes without\r\nentitlement checks\r\nDescription: An issue existed where root processes using the\r\nprocessor_set_tasks API were allowed to retrieve the task ports of\r\nother processes. This issue was addressed through additional\r\nentitlement checks.\r\nCVE-ID\r\nCVE-2015-5882 : Pedro Vilaca, working from original research by\r\nMing-chieh Pan and Sung-ting Tsai; Jonathan Levin\r\n\r\nKernel\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local attacker may control the value of stack cookies\r\nDescription: Multiple weaknesses existed in the generation of user\r\nspace stack cookies. These issues were addressed through improved\r\ngeneration of stack cookies.\r\nCVE-ID\r\nCVE-2013-3951 : Stefan Esser\r\n\r\nKernel\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An attacker may be able to launch denial of service attacks\r\non targeted TCP connections without knowing the correct sequence\r\nnumber\r\nDescription: An issue existed in xnu's validation of TCP packet\r\nheaders. This issue was addressed through improved TCP packet header\r\nvalidation.\r\nCVE-ID\r\nCVE-2015-5879 : Jonathan Looney\r\n\r\nKernel\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An attacker in a local LAN segment may disable IPv6 routing\r\nDescription: An insufficient validation issue existed in the\r\nhandling of IPv6 router advertisements that allowed an attacker to\r\nset the hop limit to an arbitrary value. This issue was addressed by\r\nenforcing a minimum hop limit.\r\nCVE-ID\r\nCVE-2015-5869 : Dennis Spindel Ljungmark\r\n\r\nKernel\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to determine kernel memory layout\r\nDescription: An issue existed that led to the disclosure of kernel\r\nmemory layout. This was addressed through improved initialization of\r\nkernel memory structures.\r\nCVE-ID\r\nCVE-2015-5842 : beist of grayhash\r\n\r\nKernel\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to determine kernel memory layout\r\nDescription: An issue existed in debugging interfaces that led to\r\nthe disclosure of memory content. This issue was addressed by\r\nsanitizing output from debugging interfaces.\r\nCVE-ID\r\nCVE-2015-5870 : Apple\r\n\r\nKernel\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to cause a system denial of service\r\nDescription: A state management issue existed in debugging\r\nfunctionality. This issue was addressed through improved validation.\r\nCVE-ID\r\nCVE-2015-5902 : Sergi Alvarez (pancake) of NowSecure Research Team\r\n\r\nlibc\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to execute arbitrary code with\r\nkernel privileges\r\nDescription: A memory corruption issue existed in the kernel. This\r\nissue was addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2014-8611 : Adrian Chadd and Alfred Perlstein of Norse\r\nCorporation\r\n\r\nlibpthread\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to execute arbitrary code with\r\nkernel privileges\r\nDescription: A memory corruption issue existed in the kernel. This\r\nissue was addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2015-5899 : Lufeng Li of Qihoo 360 Vulcan Team\r\n\r\nlibxpc\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Many SSH connections could cause a denial of service\r\nDescription: launchd had no limit on the number of processes that\r\ncould be started by a network connection. This issue was addressed by\r\nlimiting the number of SSH processes to 40.\r\nCVE-ID\r\nCVE-2015-5881 : Apple\r\n\r\nLogin Window\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: The screen lock may not engage after the specified time\r\nperiod\r\nDescription: An issue existed with captured display locking. The\r\nissue was addressed through improved lock handling.\r\nCVE-ID\r\nCVE-2015-5833 : Carlos Moreira, Rainer Dorau of rainer dorau\r\ninformationsdesign, Chris Nehren, Kai Takac, Hans Douma, Toni\r\nVaahtera, and an anonymous researcher\r\n\r\nlukemftpd\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A remote attacker may be able to deny service to the FTP\r\nserver\r\nDescription: A glob-processing issue existed in tnftpd. This issue\r\nwas addressed through improved glob validation.\r\nCVE-ID\r\nCVE-2015-5917 : Maksymilian Arciemowicz of cxsecurity.com\r\n\r\nMail\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Printing an email may leak sensitive user information\r\nDescription: An issue existed in Mail which bypassed user\r\npreferences when printing an email. This issue was addressed through\r\nimproved user preference enforcement.\r\nCVE-ID\r\nCVE-2015-5881 : Owen DeLong of Akamai Technologies, Noritaka Kamiya,\r\nDennis Klein from Eschenburg, Germany, Jeff Hammett of Systim\r\nTechnology Partners\r\n\r\nMail\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: An attacker in a privileged network position may be able to\r\nintercept attachments of S/MIME-encrypted e-mail sent via Mail Drop\r\nDescription: An issue existed in handling encryption parameters for\r\nlarge email attachments sent via Mail Drop. The issue is addressed by\r\nno longer offering Mail Drop when sending an encrypted e-mail.\r\nCVE-ID\r\nCVE-2015-5884 : John McCombs of Integrated Mapping Ltd\r\n\r\nMultipeer Connectivity\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local attacker may be able to observe unprotected\r\nmultipeer data\r\nDescription: An issue existed in convenience initializer handling in\r\nwhich encryption could be actively downgraded to a non-encrypted\r\nsession. This issue was addressed by changing the convenience\r\ninitializer to require encryption.\r\nCVE-ID\r\nCVE-2015-5851 : Alban Diquet (@nabla_c0d3) of Data Theorem\r\n\r\nNetworkExtension\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A malicious application may be able to determine kernel\r\nmemory layout\r\nDescription: An uninitialized memory issue in the kernel led to the\r\ndisclosure of kernel memory content. This issue was addressed through\r\nimproved memory initialization.\r\nCVE-ID\r\nCVE-2015-5831 : Maxime Villard of m00nbsd\r\n\r\nNotes\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to leak sensitive user information\r\nDescription: An issue existed in parsing links in the Notes\r\napplication. This issue was addressed through improved input\r\nvalidation.\r\nCVE-ID\r\nCVE-2015-5878 : Craig Young of Tripwire VERT, an anonymous researcher\r\n\r\nNotes\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to leak sensitive user information\r\nDescription: A cross-site scripting issue existed in parsing text by\r\nthe Notes application. This issue was addressed through improved\r\ninput validation.\r\nCVE-ID\r\nCVE-2015-5875 : xisigr of Tencent's Xuanwu LAB (www.tencent.com)\r\n\r\nOpenSSH\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Multiple vulnerabilities in OpenSSH\r\nDescription: Multiple vulnerabilities existed in OpenSSH versions\r\nprior to 6.9. These issues were addressed by updating OpenSSH to\r\nversion 6.9.\r\nCVE-ID\r\nCVE-2014-2532\r\n\r\nOpenSSL\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Multiple vulnerabilities in OpenSSL\r\nDescription: Multiple vulnerabilities existed in OpenSSL versions\r\nprior to 0.9.8zg. These were addressed by updating OpenSSL to version\r\n0.9.8zg.\r\nCVE-ID\r\nCVE-2015-0286\r\nCVE-2015-0287\r\n\r\nprocmail\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Multiple vulnerabilities in procmail\r\nDescription: Multiple vulnerabilities existed in procmail versions\r\nprior to 3.22. These issues were addressed by removing procmail.\r\nCVE-ID\r\nCVE-2014-3618\r\n\r\nremote_cmds\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to execute arbitrary code with root\r\nprivileges\r\nDescription: An issue existed in the usage of environment variables\r\nby the rsh binary. This issue was addressed by dropping setuid\r\nprivileges from the rsh binary.\r\nCVE-ID\r\nCVE-2015-5889 : Philip Pettersson\r\n\r\nremovefile\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Processing malicious data may lead to unexpected application\r\ntermination\r\nDescription: An overflow fault existed in the checkint division\r\nroutines. This issue was addressed with improved division routines.\r\nCVE-ID\r\nCVE-2015-5840 : an anonymous researcher\r\n\r\nRuby\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Multiple vulnerabilities in Ruby\r\nDescription: Multiple vulnerabilities existed in Ruby versions prior\r\nto 2.0.0p645. These were addressed by updating Ruby to version\r\n2.0.0p645.\r\nCVE-ID\r\nCVE-2014-8080\r\nCVE-2014-8090\r\nCVE-2015-1855\r\n\r\nSecurity\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: The lock state of the keychain may be incorrectly displayed\r\nto the user\r\nDescription: A state management issue existed in the way keychain\r\nlock status was tracked. This issue was addressed through improved\r\nstate management.\r\nCVE-ID\r\nCVE-2015-5915 : Peter Walz of University of Minnesota, David Ephron,\r\nEric E. Lawrence, Apple\r\n\r\nSecurity\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A trust evaluation configured to require revocation checking\r\nmay succeed even if revocation checking fails\r\nDescription: The kSecRevocationRequirePositiveResponse flag was\r\nspecified but not implemented. This issue was addressed by\r\nimplementing the flag.\r\nCVE-ID\r\nCVE-2015-5894 : Hannes Oud of kWallet GmbH\r\n\r\nSecurity\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A remote server may prompt for a certificate before\r\nidentifying itself\r\nDescription: Secure Transport accepted the CertificateRequest\r\nmessage before the ServerKeyExchange message. This issue was\r\naddressed by requiring the ServerKeyExchange first.\r\nCVE-ID\r\nCVE-2015-5887 : Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine\r\nDelignat-Lavaud, Alfredo Pironti, and Jean Karim Zinzindohoue of\r\nINRIA Paris-Rocquencourt, and Cedric Fournet and Markulf Kohlweiss of\r\nMicrosoft Research, Pierre-Yves Strub of IMDEA Software Institute\r\n\r\nSMB\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to execute arbitrary code with\r\nkernel privileges\r\nDescription: A memory corruption issue existed in the kernel. This\r\nissue was addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2015-5891 : Ilja van Sprundel of IOActive\r\n\r\nSMB\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local user may be able to determine kernel memory layout\r\nDescription: An issue existed in SMBClient that led to the\r\ndisclosure of kernel memory content. This issue was addressed through\r\nimproved bounds checking.\r\nCVE-ID\r\nCVE-2015-5893 : Ilja van Sprundel of IOActive\r\n\r\nSQLite\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Multiple vulnerabilities in SQLite v3.8.5\r\nDescription: Multiple vulnerabilities existed in SQLite v3.8.5.\r\nThese issues were addressed by updating SQLite to version 3.8.10.2.\r\nCVE-ID\r\nCVE-2015-3414\r\nCVE-2015-3415\r\nCVE-2015-3416\r\n\r\nTelephony\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local attacker can place phone calls without the user's\r\nknowledge when using Continuity\r\nDescription: An issue existed in the authorization checks for\r\nplacing phone calls. This issue was addressed through improved\r\nauthorization checks.\r\nCVE-ID\r\nCVE-2015-3785 : Dan Bastone of Gotham Digital Science\r\n\r\nTerminal\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Maliciously crafted text could mislead the user in Terminal\r\nDescription: Terminal did not handle bidirectional override\r\ncharacters in the same way when displaying text and when selecting\r\ntext. This issue was addressed by suppressing bidirectional override\r\ncharacters in Terminal.\r\nCVE-ID\r\nCVE-2015-5883 : an anonymous researcher\r\n\r\ntidy\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: Visiting a maliciously crafted website may lead to arbitrary\r\ncode execution\r\nDescription: Multiple memory corruption issues existed in tidy.\r\nThese issues were addressed through improved memory handling.\r\nCVE-ID\r\nCVE-2015-5522 : Fernando Munoz of NULLGroup.com\r\nCVE-2015-5523 : Fernando Munoz of NULLGroup.com\r\n\r\nTime Machine\r\nAvailable for: Mac OS X v10.6.8 and later\r\nImpact: A local attacker may gain access to keychain items\r\nDescription: An issue existed in backups by the Time Machine\r\nframework. This issue was addressed through improved coverage of Time\r\nMachine backups.\r\nCVE-ID\r\nCVE-2015-5854 : Jonas Magazinius of Assured AB\r\n\r\nNote: OS X El Capitan 10.11 includes the security content of\r\nSafari 9: https://support.apple.com/kb/HT205265.\r\n\r\nOS X El Capitan 10.11 may be obtained from the Mac App Store:\r\nhttp://www.apple.com/support/downloads/\r\n\r\nInformation will also be posted to the Apple Security Updates\r\nweb site: https://support.apple.com/kb/HT201222\r\n\r\nThis message is signed with Apple's Product Security PGP key,\r\nand details are available at:\r\nhttps://www.apple.com/support/security/pgp/\r\n\r\n", "edition": 1, "modified": "2015-10-05T00:00:00", "published": "2015-10-05T00:00:00", "id": "SECURITYVULNS:DOC:32522", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32522", "title": "APPLE-SA-2015-09-30-3 OS X El Capitan 10.11", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}, {"lastseen": "2018-08-31T11:10:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-2348", "CVE-2014-9705", "CVE-2015-5883", "CVE-2015-2787", "CVE-2015-0232", "CVE-2015-5903", "CVE-2015-6976", "CVE-2015-7007", "CVE-2015-0235", "CVE-2015-2783", "CVE-2015-5877", "CVE-2015-5927", "CVE-2015-3785", "CVE-2015-5847", "CVE-2014-9427", "CVE-2015-3329", "CVE-2015-6975", "CVE-2015-3415", "CVE-2015-7035", "CVE-2015-3330", "CVE-2015-6987", "CVE-2015-5922", "CVE-2015-5865", "CVE-2015-5869", "CVE-2015-5879", "CVE-2015-7003", "CVE-2015-5876", "CVE-2015-5858", "CVE-2015-5924", "CVE-2015-5862", "CVE-2015-0286", "CVE-2015-5888", "CVE-2015-6983", "CVE-2015-5939", "CVE-2015-5874", "CVE-2015-6834", "CVE-2015-6991", "CVE-2015-5860", "CVE-2015-1855", "CVE-2015-7020", "CVE-2014-3618", "CVE-2015-6994", "CVE-2015-1352", "CVE-2015-7016", "CVE-2015-6992", "CVE-2015-2301", "CVE-2015-7021", "CVE-2015-6977", "CVE-2015-5868", "CVE-2014-3565", "CVE-2015-5872", "CVE-2015-5839", "CVE-2015-5840", "CVE-2014-6277", "CVE-2014-9425", "CVE-2014-9709", "CVE-2015-2305", "CVE-2012-6151", "CVE-2015-5934", "CVE-2015-5873", "CVE-2015-5940", "CVE-2015-5932", "CVE-2015-0273", "CVE-2015-5875", "CVE-2015-5882", "CVE-2015-5842", "CVE-2015-6995", "CVE-2015-6978", "CVE-2015-7018", "CVE-2015-5912", "CVE-2015-6985", "CVE-2015-2331", "CVE-2015-5870", "CVE-2015-5935", "CVE-2015-5722", "CVE-2015-7010", "CVE-2015-5945", "CVE-2015-6984", "CVE-2015-7008", "CVE-2015-5841", "CVE-2015-5894", "CVE-2015-5881", "CVE-2014-2532", "CVE-2015-5831", "CVE-2014-8147", "CVE-2015-5937", "CVE-2015-5878", "CVE-2015-5855", "CVE-2015-7023", "CVE-2014-8611", "CVE-2015-6993", "CVE-2015-5871", "CVE-2015-5866", "CVE-2015-5901", "CVE-2014-8090", "CVE-2015-6836", "CVE-2015-5884", "CVE-2015-3416", "CVE-2015-5936", "CVE-2015-5889", "CVE-2015-5867", "CVE-2015-5836", "CVE-2015-6989", "CVE-2015-5915", "CVE-2015-5900", "CVE-2015-5942", "CVE-2015-7015", "CVE-2015-5890", "CVE-2014-7187", "CVE-2014-8146", "CVE-2015-5854", "CVE-2015-6990", "CVE-2015-3414", "CVE-2015-7009", "CVE-2014-9652", "CVE-2015-7031", "CVE-2015-6988", "CVE-2015-5523", "CVE-2015-5986", "CVE-2015-5943", "CVE-2015-5885", "CVE-2015-6996", "CVE-2015-6837", "CVE-2013-3951", "CVE-2015-6563", "CVE-2015-5944", "CVE-2015-5893", "CVE-2015-5917", "CVE-2014-8080", "CVE-2015-1351", "CVE-2015-5524", "CVE-2015-5887", "CVE-2015-5902", "CVE-2015-5925", "CVE-2015-5938", "CVE-2015-0287", "CVE-2015-6974", "CVE-2015-5853", "CVE-2015-6835", "CVE-2015-5897", "CVE-2015-5830", "CVE-2015-5849", "CVE-2015-5896", "CVE-2015-5833", "CVE-2015-5863", "CVE-2015-0231", "CVE-2015-5864", "CVE-2014-7186", "CVE-2015-5891", "CVE-2015-7019", "CVE-2015-7006", "CVE-2015-7017", "CVE-2015-5914", "CVE-2015-5926", "CVE-2015-5522", "CVE-2015-5851", "CVE-2015-5899", "CVE-2015-6838", "CVE-2015-5933"], "description": "Code execution, information disclosure, restrictions bypass, multiple memory corruptions, multiple libraries vulnerabilities.", "edition": 1, "modified": "2015-10-25T00:00:00", "published": "2015-10-25T00:00:00", "id": "SECURITYVULNS:VULN:14702", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14702", "title": "Apple Mac OS X / Mac EFI / OS X Server multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2021-01-01T03:23:19", "description": "The remote host is running a version of Mac OS X that is 10.6.8 or\nlater but prior to 10.11. It is, therefore, affected by multiple\nvulnerabilities in the following components :\n\n - Address Book\n - AirScan\n - apache_mod_php\n - Apple Online Store Kit\n - AppleEvents\n - Audio\n - bash\n - Certificate Trust Policy\n - CFNetwork Cookies\n - CFNetwork FTPProtocol\n - CFNetwork HTTPProtocol\n - CFNetwork Proxies\n - CFNetwork SSL\n - CoreCrypto\n - CoreText\n - Dev Tools\n - Disk Images\n - dyld\n - EFI\n - Finder\n - Game Center\n - Heimdal\n - ICU\n - Install Framework Legacy\n - Intel Graphics Driver\n - IOAudioFamily\n - IOGraphics\n - IOHIDFamily\n - IOStorageFamily\n - Kernel\n - libc\n - libpthread\n - libxpc\n - Login Window\n - lukemftpd\n - Mail\n - Multipeer Connectivity\n - NetworkExtension\n - Notes\n - OpenSSH\n - OpenSSL\n - procmail\n - remote_cmds\n - removefile\n - Ruby\n - Safari\n - Safari Downloads\n - Safari Extensions\n - Safari Safe Browsing\n - Security\n - SMB\n - SQLite\n - Telephony\n - Terminal\n - tidy\n - Time Machine\n - WebKit\n - WebKit CSS\n - WebKit JavaScript Bindings\n - WebKit Page Loading\n - WebKit Plug-ins\n\nNote that successful exploitation of the most serious issues can\nresult in arbitrary code execution.", "edition": 26, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2015-10-05T00:00:00", "title": "Mac OS X < 10.11 Multiple Vulnerabilities (GHOST)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-2348", "CVE-2014-9705", "CVE-2015-5883", "CVE-2015-2787", "CVE-2015-0232", "CVE-2015-5903", "CVE-2015-0235", "CVE-2015-2783", "CVE-2015-5825", "CVE-2015-5877", "CVE-2015-3785", "CVE-2015-5847", "CVE-2014-9427", "CVE-2015-3329", "CVE-2015-3415", "CVE-2015-3330", "CVE-2015-5798", "CVE-2015-5922", "CVE-2015-5865", "CVE-2015-5869", "CVE-2015-5879", "CVE-2015-5876", "CVE-2015-5858", "CVE-2015-5862", "CVE-2015-0286", "CVE-2015-5888", "CVE-2015-5796", "CVE-2015-5874", "CVE-2015-5808", "CVE-2015-5860", "CVE-2015-1855", "CVE-2014-3618", "CVE-2015-5812", "CVE-2015-1352", "CVE-2015-5788", "CVE-2015-2301", "CVE-2015-5868", "CVE-2015-5872", "CVE-2015-5805", "CVE-2015-5839", "CVE-2015-5840", "CVE-2014-6277", "CVE-2014-9425", "CVE-2014-9709", "CVE-2015-5828", "CVE-2015-2305", "CVE-2015-5816", "CVE-2015-5873", "CVE-2015-5794", "CVE-2015-0273", "CVE-2015-5807", "CVE-2015-5875", "CVE-2015-5882", "CVE-2015-5842", "CVE-2015-5801", "CVE-2015-5912", "CVE-2015-2331", "CVE-2015-5870", "CVE-2015-5913", "CVE-2015-5818", "CVE-2015-5803", "CVE-2015-5802", "CVE-2015-5792", "CVE-2015-5791", "CVE-2015-5841", "CVE-2015-5793", "CVE-2015-5894", "CVE-2015-5881", "CVE-2015-5795", "CVE-2014-2532", "CVE-2015-5831", "CVE-2014-8147", "CVE-2015-7760", "CVE-2015-5878", "CVE-2015-5855", "CVE-2014-8611", "CVE-2015-5789", "CVE-2015-5765", "CVE-2015-5871", "CVE-2015-5780", "CVE-2015-5866", "CVE-2015-5901", "CVE-2014-8090", "CVE-2015-5813", "CVE-2015-5824", "CVE-2015-5764", "CVE-2015-5884", "CVE-2015-3416", "CVE-2015-5821", "CVE-2015-5889", "CVE-2015-5867", "CVE-2015-5836", "CVE-2015-5915", "CVE-2015-5900", "CVE-2015-5890", "CVE-2015-5819", "CVE-2015-5800", "CVE-2015-5827", "CVE-2014-7187", "CVE-2015-5826", "CVE-2014-8146", "CVE-2015-5854", "CVE-2015-3414", "CVE-2014-9652", "CVE-2015-5523", "CVE-2015-5820", "CVE-2015-5815", "CVE-2015-5885", "CVE-2015-3801", "CVE-2013-3951", "CVE-2015-5893", "CVE-2015-5917", "CVE-2014-8080", "CVE-2015-7761", "CVE-2015-5810", "CVE-2015-1351", "CVE-2015-5887", "CVE-2015-5902", "CVE-2015-0287", "CVE-2015-5853", "CVE-2015-5897", "CVE-2015-5823", "CVE-2015-5822", "CVE-2015-5830", "CVE-2015-5849", "CVE-2015-5797", "CVE-2015-5896", "CVE-2015-5833", "CVE-2015-5863", "CVE-2015-5806", "CVE-2015-5809", "CVE-2015-5799", "CVE-2015-5790", "CVE-2015-0231", "CVE-2015-5864", "CVE-2015-5804", "CVE-2014-7186", "CVE-2015-5814", "CVE-2015-5891", "CVE-2015-5817", "CVE-2015-5914", "CVE-2015-5811", "CVE-2015-5522", "CVE-2015-5851", "CVE-2015-5899", "CVE-2015-5767"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:apple:mac_os_x"], "id": "MACOSX_10_11.NASL", "href": "https://www.tenable.com/plugins/nessus/86270", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(86270);\n script_version(\"1.15\");\n script_cvs_date(\"Date: 2019/06/20 11:24:24\");\n\n script_cve_id(\n \"CVE-2013-3951\",\n \"CVE-2014-2532\",\n \"CVE-2014-3618\",\n \"CVE-2014-6277\",\n \"CVE-2014-7186\",\n \"CVE-2014-7187\",\n \"CVE-2014-8080\",\n \"CVE-2014-8090\",\n \"CVE-2014-8146\",\n \"CVE-2014-8147\",\n \"CVE-2014-8611\",\n \"CVE-2014-9425\",\n \"CVE-2014-9427\",\n \"CVE-2014-9652\",\n \"CVE-2014-9705\",\n \"CVE-2014-9709\",\n \"CVE-2015-0231\",\n \"CVE-2015-0232\",\n \"CVE-2015-0235\",\n \"CVE-2015-0273\",\n \"CVE-2015-0286\",\n \"CVE-2015-0287\",\n \"CVE-2015-1351\",\n \"CVE-2015-1352\",\n \"CVE-2015-1855\",\n \"CVE-2015-2301\",\n \"CVE-2015-2305\",\n \"CVE-2015-2331\",\n \"CVE-2015-2348\",\n \"CVE-2015-2783\",\n \"CVE-2015-2787\",\n \"CVE-2015-3329\",\n \"CVE-2015-3330\",\n \"CVE-2015-3414\",\n \"CVE-2015-3415\",\n \"CVE-2015-3416\",\n \"CVE-2015-3785\",\n \"CVE-2015-3801\",\n \"CVE-2015-5522\",\n \"CVE-2015-5523\",\n \"CVE-2015-5764\",\n \"CVE-2015-5765\",\n \"CVE-2015-5767\",\n \"CVE-2015-5780\",\n \"CVE-2015-5788\",\n \"CVE-2015-5789\",\n \"CVE-2015-5790\",\n \"CVE-2015-5791\",\n \"CVE-2015-5792\",\n \"CVE-2015-5793\",\n \"CVE-2015-5794\",\n \"CVE-2015-5795\",\n \"CVE-2015-5796\",\n \"CVE-2015-5797\",\n \"CVE-2015-5798\",\n \"CVE-2015-5799\",\n \"CVE-2015-5800\",\n \"CVE-2015-5801\",\n \"CVE-2015-5802\",\n \"CVE-2015-5803\",\n \"CVE-2015-5804\",\n \"CVE-2015-5805\",\n \"CVE-2015-5806\",\n \"CVE-2015-5807\",\n \"CVE-2015-5808\",\n \"CVE-2015-5809\",\n \"CVE-2015-5810\",\n \"CVE-2015-5811\",\n \"CVE-2015-5812\",\n \"CVE-2015-5813\",\n \"CVE-2015-5814\",\n \"CVE-2015-5815\",\n \"CVE-2015-5816\",\n \"CVE-2015-5817\",\n \"CVE-2015-5818\",\n \"CVE-2015-5819\",\n \"CVE-2015-5820\",\n \"CVE-2015-5821\",\n \"CVE-2015-5822\",\n \"CVE-2015-5823\",\n \"CVE-2015-5824\",\n \"CVE-2015-5825\",\n \"CVE-2015-5826\",\n \"CVE-2015-5827\",\n \"CVE-2015-5828\",\n \"CVE-2015-5830\",\n \"CVE-2015-5831\",\n \"CVE-2015-5833\",\n \"CVE-2015-5836\",\n \"CVE-2015-5839\",\n \"CVE-2015-5840\",\n \"CVE-2015-5841\",\n \"CVE-2015-5842\",\n \"CVE-2015-5847\",\n \"CVE-2015-5849\",\n \"CVE-2015-5851\",\n \"CVE-2015-5853\",\n \"CVE-2015-5854\",\n \"CVE-2015-5855\",\n \"CVE-2015-5858\",\n \"CVE-2015-5860\",\n \"CVE-2015-5862\",\n \"CVE-2015-5863\",\n \"CVE-2015-5864\",\n \"CVE-2015-5865\",\n \"CVE-2015-5866\",\n \"CVE-2015-5867\",\n \"CVE-2015-5868\",\n \"CVE-2015-5869\",\n \"CVE-2015-5870\",\n \"CVE-2015-5871\",\n \"CVE-2015-5872\",\n \"CVE-2015-5873\",\n \"CVE-2015-5874\",\n \"CVE-2015-5875\",\n \"CVE-2015-5876\",\n \"CVE-2015-5877\",\n \"CVE-2015-5878\",\n \"CVE-2015-5879\",\n \"CVE-2015-5881\",\n \"CVE-2015-5882\",\n \"CVE-2015-5883\",\n \"CVE-2015-5884\",\n \"CVE-2015-5885\",\n \"CVE-2015-5887\",\n \"CVE-2015-5888\",\n \"CVE-2015-5889\",\n \"CVE-2015-5890\",\n \"CVE-2015-5891\",\n \"CVE-2015-5893\",\n \"CVE-2015-5894\",\n \"CVE-2015-5896\",\n \"CVE-2015-5897\",\n \"CVE-2015-5899\",\n \"CVE-2015-5900\",\n \"CVE-2015-5901\",\n \"CVE-2015-5902\",\n \"CVE-2015-5903\",\n \"CVE-2015-5912\",\n \"CVE-2015-5913\",\n \"CVE-2015-5914\",\n \"CVE-2015-5915\",\n \"CVE-2015-5917\",\n \"CVE-2015-5922\",\n \"CVE-2015-7760\",\n \"CVE-2015-7761\"\n );\n script_bugtraq_id(\n 60440,\n 66355,\n 69573,\n 70152,\n 70154,\n 70165,\n 70935,\n 71230,\n 71621,\n 71800,\n 71833,\n 71929,\n 71932,\n 72325,\n 72505,\n 72539,\n 72541,\n 72611,\n 72701,\n 73031,\n 73037,\n 73225,\n 73227,\n 73306,\n 73431,\n 73434,\n 74204,\n 74228,\n 74239,\n 74240,\n 74446,\n 74457,\n 75037,\n 76763,\n 76764,\n 76765,\n 76766,\n 76908,\n 76909,\n 76910,\n 76911,\n 79707\n );\n script_xref(name:\"CERT\", value:\"967332\");\n script_xref(name:\"IAVA\", value:\"2014-A-0142\");\n script_xref(name:\"APPLE-SA\", value:\"APPLE-SA-2015-09-30-3\");\n\n script_name(english:\"Mac OS X < 10.11 Multiple Vulnerabilities (GHOST)\");\n script_summary(english:\"Checks the version of Mac OS X.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a Mac OS X update that fixes multiple\nsecurity vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running a version of Mac OS X that is 10.6.8 or\nlater but prior to 10.11. It is, therefore, affected by multiple\nvulnerabilities in the following components :\n\n - Address Book\n - AirScan\n - apache_mod_php\n - Apple Online Store Kit\n - AppleEvents\n - Audio\n - bash\n - Certificate Trust Policy\n - CFNetwork Cookies\n - CFNetwork FTPProtocol\n - CFNetwork HTTPProtocol\n - CFNetwork Proxies\n - CFNetwork SSL\n - CoreCrypto\n - CoreText\n - Dev Tools\n - Disk Images\n - dyld\n - EFI\n - Finder\n - Game Center\n - Heimdal\n - ICU\n - Install Framework Legacy\n - Intel Graphics Driver\n - IOAudioFamily\n - IOGraphics\n - IOHIDFamily\n - IOStorageFamily\n - Kernel\n - libc\n - libpthread\n - libxpc\n - Login Window\n - lukemftpd\n - Mail\n - Multipeer Connectivity\n - NetworkExtension\n - Notes\n - OpenSSH\n - OpenSSL\n - procmail\n - remote_cmds\n - removefile\n - Ruby\n - Safari\n - Safari Downloads\n - Safari Extensions\n - Safari Safe Browsing\n - Security\n - SMB\n - SQLite\n - Telephony\n - Terminal\n - tidy\n - Time Machine\n - WebKit\n - WebKit CSS\n - WebKit JavaScript Bindings\n - WebKit Page Loading\n - WebKit Plug-ins\n\nNote that successful exploitation of the most serious issues can\nresult in arbitrary code execution.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.apple.com/en-us/HT205267\");\n # https://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?76b3b492\");\n # https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c7a6ddbd\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Mac OS X 10.11 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2014-6277\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Mac OS X 10.9.5 / 10.10.5 - rsh/libmalloc Privilege Escalation');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:'CANVAS');\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2013/04/26\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/10/05\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:apple:mac_os_x\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"os_fingerprint.nasl\");\n script_require_ports(\"Host/MacOSX/Version\", \"Host/OS\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\n\nos = get_kb_item(\"Host/MacOSX/Version\");\nif (!os)\n{\n os = get_kb_item_or_exit(\"Host/OS\");\n if (\"Mac OS X\" >!< os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\n c = get_kb_item(\"Host/OS/Confidence\");\n if (c <= 70) exit(1, \"Can't determine the host's OS with sufficient confidence.\");\n}\nif (!os) audit(AUDIT_OS_NOT, \"Mac OS X\");\n\nmatch = eregmatch(pattern:\"Mac OS X ([0-9]+(\\.[0-9]+)+)\", string:os);\nif (isnull(match)) exit(1, \"Failed to parse the Mac OS X version ('\" + os + \"').\");\n\nversion = match[1];\nif (\n version !~ \"^10\\.6\\.([89]|[1-9][0-9]+)\" &&\n version !~ \"^10\\.([7-9]|10)\\.\"\n) audit(AUDIT_OS_NOT, \"Mac OS X 10.6.8 or later\", \"Mac OS X \"+version);\n\nfixed_version = \"10.11\";\nif (ver_compare(ver:version, fix:fixed_version, strict:FALSE) == -1)\n{\n if (report_verbosity > 0)\n {\n report = '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fixed_version +\n '\\n';\n security_hole(port:0, extra:report);\n }\n else security_hole(0);\n exit(0);\n}\nelse exit(0, \"The host is not affected since it is running Mac OS X \"+version+\".\");\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "oracle": [{"lastseen": "2019-05-29T18:21:11", "bulletinFamily": "software", "cvelist": ["CVE-2019-2663", "CVE-2019-2688", "CVE-2019-2679", "CVE-2018-19362", "CVE-2017-5533", "CVE-2018-11218", "CVE-2015-9251", "CVE-2019-2634", "CVE-2019-2592", "CVE-2019-2606", "CVE-2019-2677", "CVE-2019-2655", "CVE-2019-2678", "CVE-2019-2617", "CVE-2017-9798", "CVE-2019-2582", "CVE-2019-2618", "CVE-2019-2685", "CVE-2018-3693", "CVE-2018-0732", "CVE-2016-7103", "CVE-2019-2683", "CVE-2017-5753", "CVE-2019-2612", "CVE-2017-5754", "CVE-2018-1000180", "CVE-2019-2726", "CVE-2014-7923", "CVE-2018-1304", "CVE-2019-2616", "CVE-2017-8287", "CVE-2019-2704", "CVE-2019-2565", "CVE-2019-2587", "CVE-2019-2639", "CVE-2019-2703", "CVE-2018-1000004", "CVE-2019-2647", "CVE-2019-2574", "CVE-2019-2706", "CVE-2019-2598", "CVE-2019-2614", "CVE-2018-2880", "CVE-2018-7566", "CVE-2018-12384", "CVE-2015-5922", "CVE-2018-7489", "CVE-2018-19361", "CVE-2019-2689", "CVE-2019-2596", "CVE-2017-15265", "CVE-2018-0734", "CVE-2019-2700", "CVE-2019-2695", "CVE-2019-2624", "CVE-2019-2651", "CVE-2017-7867", "CVE-2019-2611", "CVE-2018-5407", "CVE-2019-0190", "CVE-2018-0495", "CVE-2019-2595", "CVE-2019-2681", "CVE-2017-3735", "CVE-2019-2603", "CVE-2019-2660", "CVE-2019-2580", "CVE-2018-15756", "CVE-2018-14719", "CVE-2019-3823", "CVE-2017-0861", "CVE-2019-2697", "CVE-2019-2517", "CVE-2019-2662", "CVE-2016-3092", "CVE-2019-2709", "CVE-2018-11039", "CVE-2018-11761", "CVE-2018-12539", "CVE-2019-2579", "CVE-2018-11307", "CVE-2019-2566", "CVE-2019-2576", "CVE-2019-2551", "CVE-2014-7940", "CVE-2018-14720", "CVE-2018-16865", "CVE-2019-2571", "CVE-2019-2664", "CVE-2015-1832", "CVE-2016-0635", "CVE-2019-2558", "CVE-2019-2686", "CVE-2018-3120", "CVE-2018-14718", "CVE-2019-2602", "CVE-2019-2722", "CVE-2019-2573", "CVE-2016-7055", "CVE-2019-2605", "CVE-2018-16864", "CVE-2018-10901", "CVE-2014-9515", "CVE-2019-2633", "CVE-2015-3253", "CVE-2017-3731", "CVE-2014-9654", "CVE-2019-2583", "CVE-2019-2601", "CVE-2019-2673", "CVE-2019-2650", "CVE-2019-2687", "CVE-2018-12022", "CVE-2019-2682", "CVE-2018-20685", "CVE-2016-1182", "CVE-2018-1258", "CVE-2019-2621", "CVE-2019-2640", "CVE-2019-2642", "CVE-2019-2567", "CVE-2018-1305", "CVE-2017-17484", "CVE-2019-2713", "CVE-2018-11219", "CVE-2019-2645", "CVE-2018-16890", "CVE-2018-12404", "CVE-2019-2623", "CVE-2019-2701", "CVE-2018-3646", "CVE-2018-11237", "CVE-2018-11775", "CVE-2019-2572", "CVE-2019-2720", "CVE-2018-0735", "CVE-2019-2692", "CVE-2019-2581", "CVE-2019-2589", "CVE-2018-6485", "CVE-2018-1257", "CVE-2019-2691", "CVE-2014-8147", "CVE-2019-2698", "CVE-2019-2712", "CVE-2017-8105", "CVE-2019-2646", "CVE-2018-14721", "CVE-2018-8088", "CVE-2019-3772", "CVE-2019-2694", "CVE-2018-3314", "CVE-2019-2619", "CVE-2014-0114", "CVE-2019-2630", "CVE-2017-3732", "CVE-2019-2613", "CVE-2019-2629", "CVE-2018-0739", "CVE-2019-2670", "CVE-2019-2636", "CVE-2019-2564", "CVE-2019-2693", "CVE-2019-2609", "CVE-2019-2577", "CVE-2018-8034", "CVE-2019-2631", "CVE-2019-2649", "CVE-2019-2578", "CVE-2019-2684", "CVE-2019-2699", "CVE-2019-2656", "CVE-2019-2653", "CVE-2019-2591", "CVE-2018-1000613", "CVE-2014-9911", "CVE-2019-2570", "CVE-2018-8013", "CVE-2016-7415", "CVE-2019-2648", "CVE-2019-2707", "CVE-2018-3620", "CVE-2019-2632", "CVE-2019-2628", "CVE-2018-0161", "CVE-2019-2641", "CVE-2018-11236", "CVE-2014-8146", "CVE-2017-7525", "CVE-2019-2723", "CVE-2019-2635", "CVE-2018-3123", "CVE-2019-2615", "CVE-2019-2638", "CVE-2019-2597", "CVE-2016-6293", "CVE-2018-3312", "CVE-2014-7926", "CVE-2019-2676", "CVE-2017-3733", "CVE-2017-5664", "CVE-2019-2696", "CVE-2018-19360", "CVE-2018-11763", "CVE-2018-0733", "CVE-2019-2654", "CVE-2019-2643", "CVE-2019-2644", "CVE-2018-17199", "CVE-2016-1181", "CVE-2019-2627", "CVE-2019-2708", "CVE-2019-2665", "CVE-2019-2658", "CVE-2016-8735", "CVE-2019-2424", "CVE-2018-17189", "CVE-2019-2516", "CVE-2017-3738", "CVE-2019-2607", "CVE-2019-2671", "CVE-2019-2705", "CVE-2019-2721", "CVE-2019-2588", "CVE-2019-2675", "CVE-2019-1559", "CVE-2019-2604", "CVE-2017-7868", "CVE-2019-2594", "CVE-2019-2669", "CVE-2018-11784", "CVE-2017-5645", "CVE-2019-2586", "CVE-2019-2661", "CVE-2019-2657", "CVE-2017-12617", "CVE-2019-3822", "CVE-2019-2620", "CVE-2019-2593", "CVE-2019-2568", "CVE-2019-2690", "CVE-2019-2610", "CVE-2016-4000", "CVE-2017-3736", "CVE-2019-2702", "CVE-2019-2622", "CVE-2019-2626", "CVE-2019-2637", "CVE-2019-2518", "CVE-2018-0737", "CVE-2017-14952", "CVE-2014-0107", "CVE-2019-2674", "CVE-2019-2575", "CVE-2019-2652", "CVE-2019-2584", "CVE-2016-2141", "CVE-2019-2557", "CVE-2019-2719", "CVE-2019-2680", "CVE-2018-11040", "CVE-2017-3730", "CVE-2019-2659", "CVE-2019-2585", "CVE-2019-2625", "CVE-2016-1000031", "CVE-2019-2590", "CVE-2018-12023", "CVE-2018-1656", "CVE-2019-2600", "CVE-2019-2608"], "description": "A Critical Patch Update is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes. Please refer to:\n\n \n\n * [Critical Patch Updates, Security Alerts and Bulletins](<https://www.oracle.com/securityalerts>) for information about Oracle Security Advisories.\n\n \n\n**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released fixes. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixes without delay.**\n\nThis Critical Patch Update contains 297 new security fixes across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ April 2019 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/rs?type=doc&id=2494878.1>).\n", "modified": "2019-05-28T00:00:00", "published": "2019-04-16T00:00:00", "id": "ORACLE:CPUAPR2019-5072813", "href": "", "type": "oracle", "title": "Oracle Critical Patch Update - April 2019", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-10-04T21:15:57", "bulletinFamily": "software", "cvelist": ["CVE-2014-0107", "CVE-2014-0114", "CVE-2014-7923", "CVE-2014-7926", "CVE-2014-7940", "CVE-2014-8146", "CVE-2014-8147", "CVE-2014-9515", "CVE-2014-9654", "CVE-2014-9911", "CVE-2015-1832", "CVE-2015-3253", "CVE-2015-5922", "CVE-2015-9251", "CVE-2016-0635", "CVE-2016-1000031", "CVE-2016-1181", "CVE-2016-1182", "CVE-2016-2141", "CVE-2016-3092", "CVE-2016-4000", "CVE-2016-6293", "CVE-2016-7055", "CVE-2016-7103", "CVE-2016-7415", "CVE-2016-8735", "CVE-2017-0861", "CVE-2017-12617", "CVE-2017-14952", "CVE-2017-15265", "CVE-2017-17484", "CVE-2017-3730", "CVE-2017-3731", "CVE-2017-3732", "CVE-2017-3733", "CVE-2017-3735", "CVE-2017-3736", "CVE-2017-3738", "CVE-2017-5533", "CVE-2017-5645", "CVE-2017-5664", "CVE-2017-5753", "CVE-2017-5754", "CVE-2017-7525", "CVE-2017-7867", "CVE-2017-7868", "CVE-2017-8105", "CVE-2017-8287", "CVE-2017-9798", "CVE-2018-0161", "CVE-2018-0495", "CVE-2018-0732", "CVE-2018-0733", "CVE-2018-0734", "CVE-2018-0735", "CVE-2018-0737", "CVE-2018-0739", "CVE-2018-1000004", "CVE-2018-1000180", "CVE-2018-1000613", "CVE-2018-10901", "CVE-2018-11039", "CVE-2018-11040", "CVE-2018-11218", "CVE-2018-11219", "CVE-2018-11236", "CVE-2018-11237", "CVE-2018-11307", "CVE-2018-11761", "CVE-2018-11763", "CVE-2018-11775", "CVE-2018-11784", "CVE-2018-12022", "CVE-2018-12023", "CVE-2018-12384", "CVE-2018-12404", "CVE-2018-12539", "CVE-2018-1257", "CVE-2018-1258", "CVE-2018-1304", "CVE-2018-1305", "CVE-2018-14718", "CVE-2018-14719", "CVE-2018-14720", "CVE-2018-14721", "CVE-2018-15756", "CVE-2018-1656", "CVE-2018-16864", "CVE-2018-16865", "CVE-2018-16890", "CVE-2018-17189", "CVE-2018-17199", "CVE-2018-19360", "CVE-2018-19361", "CVE-2018-19362", "CVE-2018-20685", "CVE-2018-2880", "CVE-2018-3120", "CVE-2018-3123", "CVE-2018-3312", "CVE-2018-3314", "CVE-2018-3620", "CVE-2018-3646", "CVE-2018-3693", "CVE-2018-5407", "CVE-2018-6485", "CVE-2018-7489", "CVE-2018-7566", "CVE-2018-8013", "CVE-2018-8034", "CVE-2018-8088", "CVE-2019-0190", "CVE-2019-1559", "CVE-2019-2424", "CVE-2019-2516", "CVE-2019-2517", "CVE-2019-2518", "CVE-2019-2551", "CVE-2019-2557", "CVE-2019-2558", "CVE-2019-2564", "CVE-2019-2565", "CVE-2019-2566", "CVE-2019-2567", "CVE-2019-2568", "CVE-2019-2570", "CVE-2019-2571", "CVE-2019-2572", "CVE-2019-2573", "CVE-2019-2574", "CVE-2019-2575", "CVE-2019-2576", "CVE-2019-2577", "CVE-2019-2578", "CVE-2019-2579", "CVE-2019-2580", "CVE-2019-2581", "CVE-2019-2582", "CVE-2019-2583", "CVE-2019-2584", "CVE-2019-2585", "CVE-2019-2586", "CVE-2019-2587", "CVE-2019-2588", "CVE-2019-2589", "CVE-2019-2590", "CVE-2019-2591", "CVE-2019-2592", "CVE-2019-2593", "CVE-2019-2594", "CVE-2019-2595", "CVE-2019-2596", "CVE-2019-2597", "CVE-2019-2598", "CVE-2019-2600", "CVE-2019-2601", "CVE-2019-2602", "CVE-2019-2603", "CVE-2019-2604", "CVE-2019-2605", "CVE-2019-2606", "CVE-2019-2607", "CVE-2019-2608", "CVE-2019-2609", "CVE-2019-2610", "CVE-2019-2611", "CVE-2019-2612", "CVE-2019-2613", "CVE-2019-2614", "CVE-2019-2615", "CVE-2019-2616", "CVE-2019-2617", "CVE-2019-2618", "CVE-2019-2619", "CVE-2019-2620", "CVE-2019-2621", "CVE-2019-2622", "CVE-2019-2623", "CVE-2019-2624", "CVE-2019-2625", "CVE-2019-2626", "CVE-2019-2627", "CVE-2019-2628", "CVE-2019-2629", "CVE-2019-2630", "CVE-2019-2631", "CVE-2019-2632", "CVE-2019-2633", "CVE-2019-2634", "CVE-2019-2635", "CVE-2019-2636", "CVE-2019-2637", "CVE-2019-2638", "CVE-2019-2639", "CVE-2019-2640", "CVE-2019-2641", "CVE-2019-2642", "CVE-2019-2643", "CVE-2019-2644", "CVE-2019-2645", "CVE-2019-2646", "CVE-2019-2647", "CVE-2019-2648", "CVE-2019-2649", "CVE-2019-2650", "CVE-2019-2651", "CVE-2019-2652", "CVE-2019-2653", "CVE-2019-2654", "CVE-2019-2655", "CVE-2019-2656", "CVE-2019-2657", "CVE-2019-2658", "CVE-2019-2659", "CVE-2019-2660", "CVE-2019-2661", "CVE-2019-2662", "CVE-2019-2663", "CVE-2019-2664", "CVE-2019-2665", "CVE-2019-2669", "CVE-2019-2670", "CVE-2019-2671", "CVE-2019-2673", "CVE-2019-2674", "CVE-2019-2675", "CVE-2019-2676", "CVE-2019-2677", "CVE-2019-2678", "CVE-2019-2679", "CVE-2019-2680", "CVE-2019-2681", "CVE-2019-2682", "CVE-2019-2683", "CVE-2019-2684", "CVE-2019-2685", "CVE-2019-2686", "CVE-2019-2687", "CVE-2019-2688", "CVE-2019-2689", "CVE-2019-2690", "CVE-2019-2691", "CVE-2019-2692", "CVE-2019-2693", "CVE-2019-2694", "CVE-2019-2695", "CVE-2019-2696", "CVE-2019-2697", "CVE-2019-2698", "CVE-2019-2699", "CVE-2019-2700", "CVE-2019-2701", "CVE-2019-2702", "CVE-2019-2703", "CVE-2019-2704", "CVE-2019-2705", "CVE-2019-2706", "CVE-2019-2707", "CVE-2019-2708", "CVE-2019-2709", "CVE-2019-2712", "CVE-2019-2713", "CVE-2019-2719", "CVE-2019-2720", "CVE-2019-2721", "CVE-2019-2722", "CVE-2019-2723", "CVE-2019-2726", "CVE-2019-3772", "CVE-2019-3822", "CVE-2019-3823"], "description": "A Critical Patch Update is a collection of patches for multiple security vulnerabilities. Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be reviewed for information regarding earlier published security fixes. Please refer to:\n\n * Critical Patch Updates, Security Alerts and Bulletins for information about Oracle Security Advisories.\n\n**Oracle continues to periodically receive reports of attempts to maliciously exploit vulnerabilities for which Oracle has already released fixes. In some instances, it has been reported that attackers have been successful because targeted customers had failed to apply available Oracle patches. Oracle therefore strongly recommends that customers remain on actively-supported versions and apply Critical Patch Update fixes without delay.**\n\nThis Critical Patch Update contains 297 new security fixes across the product families listed below. Please note that an MOS note summarizing the content of this Critical Patch Update and other Oracle Software Security Assurance activities is located at [ April 2019 Critical Patch Update: Executive Summary and Analysis](<https://support.oracle.com/epmos/faces/DocumentDisplay?id=2494878.1>).\n", "modified": "2019-05-28T00:00:00", "published": "2019-04-16T00:00:00", "id": "ORACLE:CPUAPR2019", "href": "", "type": "oracle", "title": " Oracle Critical Patch Update Advisory - April 2019", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}