The remote host is running Mac OS X 10.8.x prior to 10.8.2 with multiple vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | [SECURITY] Fedora 16 Update: php-5.3.15-1.fc16 | 5 Aug 201221:22 | – | fedora |
![]() | [SECURITY] Fedora 16 Update: php-5.3.14-1.fc16 | 2 Jul 201222:31 | – | fedora |
![]() | [SECURITY] Fedora 17 Update: php-5.4.5-1.fc17 | 5 Aug 201221:27 | – | fedora |
![]() | [SECURITY] Fedora 17 Update: php-5.4.4-1.fc17 | 30 Jun 201222:07 | – | fedora |
![]() | [SECURITY] Fedora 16 Update: maniadrive-1.2-32.fc16.5 | 27 May 201201:52 | – | fedora |
![]() | [SECURITY] Fedora 16 Update: php-eaccelerator-0.9.6.1-9.fc16.6 | 2 Jul 201222:31 | – | fedora |
![]() | [SECURITY] Fedora 17 Update: php-5.4.16-1.fc17 | 23 Jun 201305:58 | – | fedora |
![]() | [SECURITY] Fedora 17 Update: php-5.4.13-1.fc17 | 3 Apr 201304:38 | – | fedora |
![]() | [SECURITY] Fedora 16 Update: bind-9.8.3-2.P1.fc16 | 15 Jun 201212:24 | – | fedora |
![]() | [SECURITY] Fedora 17 Update: maniadrive-1.2-41.fc17 | 30 Jun 201222:07 | – | fedora |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(62215);
script_version("1.22");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/28");
script_cve_id(
"CVE-2011-4313",
"CVE-2012-0831",
"CVE-2012-1172",
"CVE-2012-1667",
"CVE-2012-1823",
"CVE-2012-2143",
"CVE-2012-2311",
"CVE-2012-2386",
"CVE-2012-2688",
"CVE-2012-3718",
"CVE-2012-3720"
);
script_bugtraq_id(
47545,
50690,
51954,
53388,
53403,
53729,
53772,
54638,
56243,
56252
);
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2022/04/15");
script_name(english:"Mac OS X 10.8.x < 10.8.2 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a Mac OS X update that fixes several
security issues.");
script_set_attribute(attribute:"description", value:
"The remote host is running a version of Mac OS X 10.8.x that is prior
to 10.8.2. The newer version contains multiple security-related fixes
for the following components :
- BIND
- Data Security
- LoginWindow
- Mobile Accounts
- PHP");
script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/HT5501");
script_set_attribute(attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html");
script_set_attribute(attribute:"solution", value:
"Upgrade to Mac OS X 10.8.2 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2012-2688");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'PHP CGI Argument Injection');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
script_set_attribute(attribute:"canvas_package", value:"CANVAS");
script_set_attribute(attribute:"vuln_publication_date", value:"2011/11/16");
script_set_attribute(attribute:"patch_publication_date", value:"2012/09/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/09/20");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x:10.8");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2012-2024 Tenable Network Security, Inc.");
script_dependencies("ssh_get_info.nasl", "os_fingerprint.nasl");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
os = get_kb_item("Host/MacOSX/Version");
if (!os)
{
os = get_kb_item_or_exit("Host/OS");
if ("Mac OS X" >!< os) audit(AUDIT_OS_NOT, "Mac OS X");
c = get_kb_item("Host/OS/Confidence");
if (c <= 70) exit(1, "Can't determine the host's OS with sufficient confidence.");
}
if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
if (ereg(pattern:"Mac OS X 10\.8($|\.[0-1]([^0-9]|$))", string:os)) security_hole(0);
else exit(0, "The host is not affected as it is running "+os+".");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo