Lucene search

K

Apple Mac OS X Security Update (HT211170 - 03)

πŸ—“οΈΒ 27 May 2020Β 00:00:00Reported byΒ Copyright (C) 2020 Greenbone Networks GmbHTypeΒ 
openvas
Β openvas
πŸ”—Β plugins.openvas.orgπŸ‘Β 30Β Views

Apple Mac OS X Security Update (HT211170 - 03) addresses multiple vulnerabilities including insufficient input validation in URL parsing and an unknown error. Successful exploitation permits remote attackers to exfiltrate autofilled data in Safari and access protected file system areas. Affected versions range from 10.14.x to 10.14.6, with the solution being the application of security update 2020-003

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2020-9771
22 Oct 202017:52
–cvelist
Cvelist
CVE-2020-9857
27 Oct 202020:51
–cvelist
CVE
CVE-2020-9771
22 Oct 202018:15
–cve
CVE
CVE-2020-9857
27 Oct 202021:15
–cve
Prion
Design/Logic Flaw
22 Oct 202018:15
–prion
Prion
Input validation
27 Oct 202021:15
–prion
NVD
CVE-2020-9771
22 Oct 202018:15
–nvd
NVD
CVE-2020-9857
27 Oct 202021:15
–nvd
Microsoft Malware Protection
Microsoft finds new macOS vulnerability, Shrootless, that could bypass System Integrity Protection
28 Oct 202116:00
–mmpc
Microsoft Malware Protection
New macOS vulnerability, β€œpowerdir,” could lead to unauthorized user data access
10 Jan 202217:00
–mmpc
Rows per page
# Copyright (C) 2020 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.817132");
  script_version("2023-10-20T16:09:12+0000");
  script_cve_id("CVE-2020-9857", "CVE-2020-9771");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
  script_tag(name:"last_modification", value:"2023-10-20 16:09:12 +0000 (Fri, 20 Oct 2023)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2020-10-30 12:33:00 +0000 (Fri, 30 Oct 2020)");
  script_tag(name:"creation_date", value:"2020-05-27 12:17:02 +0530 (Wed, 27 May 2020)");
  script_name("Apple Mac OS X Security Update (HT211170 - 03)");

  script_tag(name:"summary", value:"Apple Mac OS X is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to:

  - An issue in the parsing of URLs due to insufficient input validation.

  - An unknown error.");

  script_tag(name:"impact", value:"Successful exploitation will allow remote
  attackers to exfiltrate autofilled data in Safari and gain access to protected
  parts of the file system.");

  script_tag(name:"affected", value:"Apple Mac OS X versions 10.14.x through 10.14.6");

  script_tag(name:"solution", value:"Apply security update 2020-003 for Apple Mac OS X
  version 10.14.x.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"package");
  script_xref(name:"URL", value:"https://support.apple.com/en-us/HT211170");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
  script_family("Mac OS X Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/osx_name", "ssh/login/osx_version");
  exit(0);
}

include("version_func.inc");
include("ssh_func.inc");

osName = get_kb_item("ssh/login/osx_name");
if(!osName)
  exit(0);

osVer = get_kb_item("ssh/login/osx_version");
if(!osVer || osVer !~ "^10\.14" || "Mac OS X" >!< osName)
  exit(0);

if(version_in_range(version:osVer, test_version:"10.14", test_version2:"10.14.5")){
  fix = "Upgrade to latest OS release and apply patch from vendor";
}

else if(osVer == "10.14.6")
{
  buildVer = get_kb_item("ssh/login/osx_build");
  if(osVer == "10.14.6" && version_is_less(version:buildVer, test_version:"18G5033"))
  {
    fix = "Apply patch from vendor";
    osVer = osVer + " Build " + buildVer;
  }
}

if(fix)
{
  report = report_fixed_ver(installed_version:osVer, fixed_version:fix);
  security_message(port:0, data:report);
  exit(0);
}

exit(99);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo