Lucene search

K
nessusThis script is Copyright (C) 2006-2024 Tenable Network Security, Inc.MACOSX_SECUPD2006-008.NASL
HistoryDec 20, 2006 - 12:00 a.m.

Mac OS X Security Update 2006-008

2006-12-2000:00:00
This script is Copyright (C) 2006-2024 Tenable Network Security, Inc.
www.tenable.com
8

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

80.0%

The remote host is running a version of Mac OS X 10.4 that does not have Security Update 2006-008 applied.

This update fixes a flaw in QuickTime that may allow a rogue website to obtain the images rendered on the user screen. By combining this flaw with Quartz Composer, an attacker may be able to obtain screen shots of the remote host.

#TRUSTED 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
#TRUST-RSA-SHA256 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
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
 script_id(23926);
 script_version("1.22");
 script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/28");

 script_cve_id("CVE-2006-5681");
 script_bugtraq_id(21672);

 script_name(english:"Mac OS X Security Update 2006-008");
 script_summary(english:"Check for the presence of SecUpdate 2006-008");

 script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a Mac OS X update that fixes a security
issue.");
 script_set_attribute(attribute:"description", value:
"The remote host is running a version of Mac OS X 10.4 that does not
have Security Update 2006-008 applied. 

This update fixes a flaw in QuickTime that may allow a rogue website to
obtain the images rendered on the user screen.  By combining this flaw
with Quartz Composer, an attacker may be able to obtain screen shots of
the remote host.");
 script_set_attribute(attribute:"see_also", value:"http://docs.info.apple.com/article.html?artnum=304916");
 script_set_attribute(attribute:"solution", value:
"Install the security update 2006-008 :

http://www.apple.com/support/downloads/securityupdate2006008universal.html
http://www.apple.com/support/downloads/securityupdate2006008ppc.html");
 script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"cvss_score_source", value:"CVE-2006-5681");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"vuln_publication_date", value:"2006/12/19");
 script_set_attribute(attribute:"patch_publication_date", value:"2006/12/17");
 script_set_attribute(attribute:"plugin_publication_date", value:"2006/12/20");

 script_set_attribute(attribute:"plugin_type", value:"local");
 script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x:10.4");
 script_end_attributes();

 script_category(ACT_GATHER_INFO);

 script_copyright(english:"This script is Copyright (C) 2006-2024 Tenable Network Security, Inc.");
 script_family(english:"MacOS X Local Security Checks");

 script_dependencies("ssh_get_info.nasl");
 script_require_keys("Host/MacOSX/packages");
 exit(0);
}

include("misc_func.inc");
include("ssh_func.inc");
include("macosx_func.inc");


enable_ssh_wrappers();

# Look at the exact version of QuartzComposer
cmd = GetBundleVersionCmd(file:"QuartzComposer.component", path:"/System/Library/Quicktime", long:TRUE);

if ( islocalhost() )
 buf = pread_wrapper(cmd:"/bin/bash", argv:make_list("bash", "-c", cmd));
else
{
 ret = ssh_open_connection();
 if ( ! ret ) exit(0);
 buf = ssh_cmd(cmd:cmd);
 ssh_close_connection();
}

if ( buf !~ "^[0-9]" ) exit(0);

buf = chomp(buf);

set_kb_item(name:"MacOSX/QuickTimeQuartzComposer/Version", value:buf);

version = split(buf, sep:'.', keep:FALSE);

if (( int(version[0]) == 22 && int(version[1]) < 1 ) ||
    ( int(version[0]) == 22 && int(version[1]) == 1 && int(version[2]) < 3 ) ) security_note( 0 );
VendorProductVersionCPE
applemac_os_x10.4cpe:/o:apple:mac_os_x:10.4

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

6.5 Medium

AI Score

Confidence

Low

0.007 Low

EPSS

Percentile

80.0%

Related for MACOSX_SECUPD2006-008.NASL