8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.5 Medium
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.005 Low
EPSS
Percentile
76.6%
Apple Mac OS X is prone to multiple vulnerabilities.
# SPDX-FileCopyrightText: 2018 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.813113");
script_version("2024-02-09T14:47:30+0000");
script_cve_id("CVE-2018-4104", "CVE-2018-4106", "CVE-2018-4144", "CVE-2018-4139",
"CVE-2018-4136", "CVE-2018-4112", "CVE-2018-4175", "CVE-2018-4176",
"CVE-2018-4156", "CVE-2018-4154", "CVE-2018-4151", "CVE-2018-4155",
"CVE-2018-4158", "CVE-2018-4166");
script_tag(name:"cvss_base", value:"9.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2024-02-09 14:47:30 +0000 (Fri, 09 Feb 2024)");
script_tag(name:"severity_vector", value:"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-08-24 17:37:00 +0000 (Mon, 24 Aug 2020)");
script_tag(name:"creation_date", value:"2018-04-02 10:46:27 +0530 (Mon, 02 Apr 2018)");
script_name("Apple Mac OS X Security Updates (HT208692)-02");
script_tag(name:"summary", value:"Apple Mac OS X is prone to multiple vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to:
- An input validation issue.
- A command injection issue in the handling of Bracketed Paste Mode.
- A buffer overflow error.
- Memory corruption due to a logic issue.
- An out-of-bounds read error.
- A validation issue in the handling of symlinks.
- A logic issue.
- A race condition.
- A race condition was addressed with additional validation.");
script_tag(name:"impact", value:"Successful exploitation of this vulnerability
will allow remote attackers to read restricted memory, execute arbitrary code
with system privileges, arbitrary command execution spoofing, gain access to user
information, bypass code signing enforcement, launching arbitrary application
and gain elevated privileges.");
script_tag(name:"affected", value:"Apple Mac OS X versions 10.11.x through
10.11.6, 10.12.x through 10.12.6, 10.13.x through 10.13.3");
script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
script_xref(name:"URL", value:"https://support.apple.com/en-us/HT208692");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2018 Greenbone AG");
script_family("Mac OS X Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/osx_name", "ssh/login/osx_version", re:"ssh/login/osx_version=^10\.1[1-3]");
exit(0);
}
include("version_func.inc");
osName = get_kb_item("ssh/login/osx_name");
if(!osName)
exit(0);
osVer = get_kb_item("ssh/login/osx_version");
if(!osVer || osVer !~ "^10\.1[1-3]" || "Mac OS X" >!< osName){
exit(0);
}
if((osVer == "10.11.6") || (osVer == "10.12.6"))
{
buildVer = get_kb_item("ssh/login/osx_build");
if(!buildVer){
exit(0);
}
##https://en.wikipedia.org/wiki/OS_X_El_Capitan
if(osVer == "10.11.6" && version_is_less(version:buildVer, test_version:"15G20015"))
{
fix = "Apply patch from vendor";
osVer = osVer + " Build " + buildVer;
}
##https://en.wikipedia.org/wiki/MacOS_Sierra
else if(osVer == "10.12.6" && version_is_less(version:buildVer, test_version:"16G1314"))
{
fix = "Apply patch from vendor";
osVer = osVer + " Build " + buildVer;
}
}
if(osVer =~ "^10\.11")
{
if(version_is_less(version:osVer, test_version:"10.11.5")){
fix = "Upgrade to latest OS release 10.11.6 and apply patch from vendor";
}
}
else if(osVer =~ "^10\.12")
{
if(version_is_less(version:osVer, test_version:"10.12.5")){
fix = "Upgrade to latest OS release 10.12.6 and apply patch from vendor";
}
}
else if(osVer =~ "^10\.13")
{
if(version_is_less(version:osVer, test_version:"10.13.4")){
fix = "10.13.4";
}
}
if(fix)
{
report = report_fixed_ver(installed_version:osVer, fixed_version:fix);
security_message(data:report);
exit(0);
}
exit(99);
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.5 Medium
AI Score
Confidence
Low
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.005 Low
EPSS
Percentile
76.6%