Anfälligkeitssuche        Suche in 172616 CVE Beschreibungen
und 81291 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.814604
Kategorie:Mac OS X Local Security Checks
Titel:Apple MacOSX Security Updates(HT209341)-01
Zusammenfassung:This host is installed with Apple Mac OS X; and is prone to multiple vulnerabilities.
Beschreibung:Summary:
This host is installed with Apple Mac OS X
and is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exists due to,

- A validation issue was addressed with improved input sanitization.

- A memory corruption issue was addressed with improved memory handling.

- A logic issue was addressed with improved restrictions.

- A memory corruption issue was addressed with improved state management.

Vulnerability Impact:
Successful exploitation allows attackers to
to read restricted memory and execute arbitrary code with elevated privileges.

Affected Software/OS:
Apple Mac OS X versions 10.12.x through
10.12.6 build 16G1618, 10.13.x through 10.13.6 build 17G3025 and 10.14.x through
10.14.1.

Solution:
Upgrade to Apple Mac OS X 10.14.2 or later
or apply appropriate patch for 10.12.x or 10.13.x versions. Please see the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2018-4462
https://support.apple.com/kb/HT209341
Common Vulnerability Exposure (CVE) ID: CVE-2018-4465
https://support.apple.com/kb/HT209340
Common Vulnerability Exposure (CVE) ID: CVE-2018-4435
https://support.apple.com/kb/HT209342
https://support.apple.com/kb/HT209343
Common Vulnerability Exposure (CVE) ID: CVE-2018-4449
Common Vulnerability Exposure (CVE) ID: CVE-2018-4450
Common Vulnerability Exposure (CVE) ID: CVE-2018-4447
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

Dies ist nur einer von 81291 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.