Apple Mac OS X Security Update (HT211170 - 03) addresses multiple vulnerabilities including insufficient input validation in URL parsing and an unknown error. Successful exploitation permits remote attackers to exfiltrate autofilled data in Safari and access protected file system areas. Affected versions range from 10.14.x to 10.14.6, with the solution being the application of security update 2020-003
Reporter | Title | Published | Views | Family All 18 |
---|---|---|---|---|
Cvelist | CVE-2020-9771 | 22 Oct 202017:52 | β | cvelist |
Cvelist | CVE-2020-9857 | 27 Oct 202020:51 | β | cvelist |
CVE | CVE-2020-9771 | 22 Oct 202018:15 | β | cve |
CVE | CVE-2020-9857 | 27 Oct 202021:15 | β | cve |
Prion | Design/Logic Flaw | 22 Oct 202018:15 | β | prion |
Prion | Input validation | 27 Oct 202021:15 | β | prion |
NVD | CVE-2020-9771 | 22 Oct 202018:15 | β | nvd |
NVD | CVE-2020-9857 | 27 Oct 202021:15 | β | nvd |
Microsoft Malware Protection | Microsoft finds new macOS vulnerability, Shrootless, that could bypass System Integrity Protection | 28 Oct 202116:00 | β | mmpc |
Microsoft Malware Protection | New macOS vulnerability, βpowerdir,β could lead to unauthorized user data access | 10 Jan 202217:00 | β | mmpc |
Source | Link |
---|---|
support | www.support.apple.com/en-us/HT211170 |
# Copyright (C) 2020 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.817132");
script_version("2023-10-20T16:09:12+0000");
script_cve_id("CVE-2020-9857", "CVE-2020-9771");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:N/A:N");
script_tag(name:"last_modification", value:"2023-10-20 16:09:12 +0000 (Fri, 20 Oct 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2020-10-30 12:33:00 +0000 (Fri, 30 Oct 2020)");
script_tag(name:"creation_date", value:"2020-05-27 12:17:02 +0530 (Wed, 27 May 2020)");
script_name("Apple Mac OS X Security Update (HT211170 - 03)");
script_tag(name:"summary", value:"Apple Mac OS X is prone to multiple vulnerabilities.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to:
- An issue in the parsing of URLs due to insufficient input validation.
- An unknown error.");
script_tag(name:"impact", value:"Successful exploitation will allow remote
attackers to exfiltrate autofilled data in Safari and gain access to protected
parts of the file system.");
script_tag(name:"affected", value:"Apple Mac OS X versions 10.14.x through 10.14.6");
script_tag(name:"solution", value:"Apply security update 2020-003 for Apple Mac OS X
version 10.14.x.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
script_xref(name:"URL", value:"https://support.apple.com/en-us/HT211170");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
script_family("Mac OS X Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/osx_name", "ssh/login/osx_version");
exit(0);
}
include("version_func.inc");
include("ssh_func.inc");
osName = get_kb_item("ssh/login/osx_name");
if(!osName)
exit(0);
osVer = get_kb_item("ssh/login/osx_version");
if(!osVer || osVer !~ "^10\.14" || "Mac OS X" >!< osName)
exit(0);
if(version_in_range(version:osVer, test_version:"10.14", test_version2:"10.14.5")){
fix = "Upgrade to latest OS release and apply patch from vendor";
}
else if(osVer == "10.14.6")
{
buildVer = get_kb_item("ssh/login/osx_build");
if(osVer == "10.14.6" && version_is_less(version:buildVer, test_version:"18G5033"))
{
fix = "Apply patch from vendor";
osVer = osVer + " Build " + buildVer;
}
}
if(fix)
{
report = report_fixed_ver(installed_version:osVer, fixed_version:fix);
security_message(port:0, data:report);
exit(0);
}
exit(99);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo