Lucene search

K
openvasCopyright (C) 2016 Greenbone AGOPENVAS:1361412562310810223
HistoryNov 17, 2016 - 12:00 a.m.

Apple Mac OS X Denial of Service And Access Bypass Vulnerability

2016-11-1700:00:00
Copyright (C) 2016 Greenbone AG
plugins.openvas.org
14

6.9 Medium

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.4%

Apple Mac OS X is prone to denial of service and access bypass vulnerability.

# SPDX-FileCopyrightText: 2016 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.810223");
  script_version("2023-07-21T05:05:22+0000");
  script_cve_id("CVE-2014-1296", "CVE-2013-4164");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_tag(name:"last_modification", value:"2023-07-21 05:05:22 +0000 (Fri, 21 Jul 2023)");
  script_tag(name:"creation_date", value:"2016-11-17 22:43:28 -0800 (Thu, 17 Nov 2016)");
  script_name("Apple Mac OS X Denial of Service And Access Bypass Vulnerability");

  script_tag(name:"summary", value:"Apple Mac OS X is prone to denial of service and access bypass vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The flaws are due to the CFNetwork does
  not ensure that a Set-Cookie HTTP header is complete before interpreting the
  header's value and a heap-based buffer overflow error in Ruby.");

  script_tag(name:"impact", value:"Successful exploitation will allow attacker
  to execute arbitrary code or cause a denial of service (memory corruption) and
  to bypass access restrictions.");

  script_tag(name:"affected", value:"Apple Mac OS X versions 10.7.x through
  10.7.5");

  script_tag(name:"solution", value:"These vulnerabilities were addressed in Security Update 2014-002.");

  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"qod", value:"30"); ## build information not available

  script_xref(name:"URL", value:"https://support.apple.com/en-us/HT201541");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/67024");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/63873");
  script_xref(name:"URL", value:"https://support.apple.com/en-us/HT202966");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2016 Greenbone AG");
  script_family("Mac OS X Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/osx_name", "ssh/login/osx_version", re:"ssh/login/osx_version=^10\.7");

  exit(0);
}

include("version_func.inc");

osName = get_kb_item("ssh/login/osx_name");
if(!osName)
  exit(0);

osVer = get_kb_item("ssh/login/osx_version");
if(!osVer)
  exit(0);

if("Mac OS X" >< osName && osVer =~ "^10\.7")
{
  if(version_in_range(version:osVer, test_version:"10.7.0", test_version2:"10.7.5"))
  {
    report = report_fixed_ver(installed_version:osVer, fixed_version:"See Vendor");
    security_message(data:report);
    exit(0);
  }
  exit(99);
}

exit(0);

6.9 Medium

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.045 Low

EPSS

Percentile

92.4%