فا

‫ Apple OS X Multiple Vulnerabilities


ID: IRCAD2015104100

Release Date: 2015-10-01

Software:

Apple Macintosh OS X

Description:

Apple has issued a security update for Apple OS X, which fixes some vulnerabilities.

1) An error within the Address Book framework can be exploited to execute code with elevated privileges.

2) An error when processing eSCL packets can be exploited to disclose certain information via a MitM (Man-in-the-Middle) attack.

3) An error when handling audio files can be exploited to corrupt memory.

4) An error related to the DiskImages can be exploited to corrupt memory.

5) An error within the Heimdal can be exploited to replay otherwise restricted Kerberos credentials to the SMB server.

6) An unspecified error within the ICU exists. No further information is currently available.

7) An error related to Install Framework Legacy can be exploited to execute arbitrary code with root privileges.

8) Some errors related to the Intel Graphics Driver can be exploited to cause memory corruption subsequently execute code with elevated privileges.

9) An error related to the IOAudioFamily interface can be exploited to disclose kernel memory layout.

10) Some errors related to the IOGraphics component can be exploited to execute code with elevated privileges.

11) An error related to the IOGraphics interface can be exploited to disclose kernel memory layout.

12) An error related to the IOStorageFamily interface can be exploited disclose kernel memory contents.

13) Some errors in the Kernel can be exploited to cause memory corruption and subsequently execute code with elevated privileges.

14) An error when handling TCP packet headers can be exploited to cause a crash.

15) An error in the Kernel can be exploited to disclose kernel memory layout.

16) An error in related to the debugging interfaces can be exploited to disclose kernel memory layout.

17) An error related to the debugging functionality can be exploited cause a crash.

18) An error within the "fflush()" function (libc) can be exploited to corrupt memory.

19) An error related to the libpthread can be exploited to corrupt memory.

20) An error related to the glob processing can be exploited to cause a crash in the lukemftpd server.

21) An error related to the Mail Drop can be exploited to disclose S/MIME-encrypted e-mail content via a MitM (Man-in-the-Middle) attack.

22) An error related to the Multipeer Connectivity when handling convenience initializer can be exploited to downgrade encryption to a non-encrypted session.

23) An error related to the Notes application when parsing links can be exploited to disclose certain sensitive information.

24) An error within the rsh binary related to the remote_cmds can be exploited to execute code with elevated privileges via a specially crafted environment variable.

25) An error related to the SMB can be exploited to corrupt memory and subsequently execute arbitrary code with kernel privileges.

26) An error related to the SMBClient interface can be exploited to disclose kernel memory layout.

27) An error related to the Time Machine can be exploited to disclose otherwise restricted keychain items.

Solution

Update to version 10.11.

References:

APPLE-SA-2015-09-30-3:

https://support.apple.com/en-us/HT205267

Philip Pettersson:

http://seclists.org/fulldisclosure/2015/Oct/5

Secunia:

https://secunia.com/advisories/66716/

 

 

 


نظرات

بدون نظر
شما برای نظر دادن باید وارد شوید

نوشته

 
تاریخ ایجاد: 20 مهر 1394

امتیاز

امتیاز شما
تعداد امتیازها: 0