The remote host is missing Mac OS X 10.6.2 Update / Mac OS X Security Update 2009-006. Components affected include AFP Client, Adaptive Firewall, Apache, ATS, CoreGraphics, CUPS, Disk Images, and more
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Mac OS X 10.6.2 Update / Mac OS X Security Update 2009-006 | 12 May 201000:00 | – | openvas |
![]() | Slackware: Security Advisory (SSA:2009-214-01) | 10 Sep 201200:00 | – | openvas |
![]() | Slackware Advisory SSA:2009-214-01 httpd | 11 Sep 201200:00 | – | openvas |
![]() | FreeBSD Ports: apache | 2 Sep 200900:00 | – | openvas |
![]() | FreeBSD Ports: apache | 2 Sep 200900:00 | – | openvas |
![]() | Ubuntu USN-787-1 (apache2) | 15 Jun 200900:00 | – | openvas |
![]() | Ubuntu: Security Advisory (USN-787-1) | 15 Jun 200900:00 | – | openvas |
![]() | Apple QuickTime Multiple Vulnerabilities - Sep09 | 11 Sep 200900:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200907-04 (apache) | 29 Jul 200900:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200907-04 (apache) | 29 Jul 200900:00 | – | openvas |
###################################################################
# OpenVAS Vulnerability Test
#
# Mac OS X 10.6.2 Update / Mac OS X Security Update 2009-006
#
# LSS-NVT-2010-027
#
# Developed by LSS Security Team <http://security.lss.hr>
#
# Copyright (C) 2010 LSS <http://www.lss.hr>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public
# License along with this program. If not, see
# <http://www.gnu.org/licenses/>.
###################################################################
tag_solution = "Update your Mac OS X operating system.
For more information see:
http://support.apple.com/kb/HT3937";
tag_summary = "The remote host is missing Mac OS X 10.6.2 Update / Mac OS X Security Update 2009-006.
One or more of the following components are affected:
AFP Client
Adaptive Firewall
Apache
Apache Portable Runtime
ATS
Certificate Assistant
CoreGraphics
CoreMedia
CUPS
Dictionary
DirectoryService
Disk Images
Dovecot
Event Monitor
fetchmail
file
FTP Server
Help Viewer
ImageIO
International Components for Unicode
IOKit
IPSec
Kernel
Launch Services
libsecurity
libxml
Login Window
OpenLDAP
OpenSSH
PHP
QuickDraw Manager
QuickLook
QuickTime
FreeRADIUS
Screen Sharing
Spotlight
Subversion";
if(description)
{
script_id(102038);
script_version("$Revision: 5394 $");
script_tag(name:"last_modification", value:"$Date: 2017-02-22 10:22:42 +0100 (Wed, 22 Feb 2017) $");
script_tag(name:"creation_date", value:"2010-05-12 14:48:44 +0200 (Wed, 12 May 2010)");
script_cve_id("CVE-2009-2819","CVE-2009-2818","CVE-2009-0023","CVE-2009-1191","CVE-2009-1195","CVE-2009-1890","CVE-2009-1891","CVE-2009-1955","CVE-2009-1956","CVE-2009-2823","CVE-2009-2412","CVE-2009-2824","CVE-2009-2825","CVE-2009-2826","CVE-2009-2202","CVE-2009-2799","CVE-2009-2820","CVE-2009-2831","CVE-2009-2828","CVE-2009-2827","CVE-2009-3235","CVE-2009-2829","CVE-2009-2666","CVE-2009-2830","CVE-2009-2832","CVE-2009-2808","CVE-2009-2285","CVE-2009-2833","CVE-2009-2834","CVE-2009-1574","CVE-2009-1632","CVE-2009-2835","CVE-2009-2810","CVE-2009-2409","CVE-2009-2414","CVE-2009-2416","CVE-2009-2836","CVE-2009-2408","CVE-2007-5707","CVE-2007-6698","CVE-2008-0658","CVE-2008-5161","CVE-2009-3291","CVE-2009-3292","CVE-2009-3293","CVE-2009-2837","CVE-2009-2838","CVE-2009-2203","CVE-2009-2798","CVE-2009-3111","CVE-2009-2839","CVE-2009-2840","CVE-2009-2411");
script_name("Mac OS X 10.6.2 Update / Mac OS X Security Update 2009-006");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2010 LSS");
script_family("Mac OS X Local Security Checks");
script_require_ports("Services/ssh", 22);
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/osx_name","ssh/login/osx_version");
script_tag(name : "summary" , value : tag_summary);
script_tag(name : "solution" , value : tag_solution);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("pkg-lib-macosx.inc");
include("version_func.inc");
ssh_osx_name = get_kb_item("ssh/login/osx_name");
if (!ssh_osx_name) exit (0);
ssh_osx_ver = get_kb_item("ssh/login/osx_version");
if (!ssh_osx_ver) exit (0);
ssh_osx_rls = ssh_osx_name + ' ' + ssh_osx_ver;
pkg_for_ver = make_list("Mac OS X 10.5.8","Mac OS X Server 10.5.8","Mac OS X Server 10.6.1","Mac OS X 10.6.1");
if (rlsnotsupported(rls:ssh_osx_rls, list:pkg_for_ver)) { security_message(0); exit(0);}
if (osx_rls_name(rls:ssh_osx_rls) == osx_rls_name(rls:"Mac OS X 10.5.8")) {
if (version_is_less(version:osx_ver(ver:ssh_osx_rls), test_version:osx_ver(ver:"Mac OS X 10.5.8"))) { security_message(0); exit(0);}
else if ((ssh_osx_ver==osx_ver(ver:"Mac OS X 10.5.8")) && (isosxpkgvuln(fixed:"com.apple.pkg.update.security.", diff:"2009.006"))) { security_message(0); exit(0);}
}
if (osx_rls_name(rls:ssh_osx_rls) == osx_rls_name(rls:"Mac OS X Server 10.5.8")) {
if (version_is_less(version:osx_ver(ver:ssh_osx_rls), test_version:osx_ver(ver:"Mac OS X Server 10.5.8"))) { security_message(0); exit(0);}
else if ((ssh_osx_ver==osx_ver(ver:"Mac OS X Server 10.5.8")) && (isosxpkgvuln(fixed:"com.apple.pkg.update.security.", diff:"2009.006"))) { security_message(0); exit(0);}
}
if (osx_rls_name(rls:ssh_osx_rls) == osx_rls_name(rls:"Mac OS X Server 10.6.1")) {
if (version_is_less(version:osx_ver(ver:ssh_osx_rls), test_version:"10.6.2")) { security_message(0); exit(0); }
}
if (osx_rls_name(rls:ssh_osx_rls) == osx_rls_name(rls:"Mac OS X 10.6.1")) {
if (version_is_less(version:osx_ver(ver:ssh_osx_rls), test_version:"10.6.2")) { security_message(0); exit(0); }
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo