Apple Mac OS X Multiple Vulnerabilities
Last Update Date:
16 Sep 2013 14:35
Release Date:
16 Sep 2013
4126
Views
RISK: High Risk
TYPE: Operating Systems - Mac OS
Multiple vulnerabilities have been identified in Apple OS X. Which can be exploited by attacker to denial of service conditions, spoof IPSec servers, bypass access controls and compromise the target user's system.
- Some errors exist due to a bundled vulnerable version of Apache.
- Some errors exist due to a bundled vulnerable version of Bind.
- Some errors exist due to a bundled vulnerable version of ClamAV.
- A boundary error in the CoreGraphics component when handling JBIG2 encoded data within PDF files can be exploited to cause a buffer overflow.
- A boundary error in the ImageIO component when handling JBIG2 encoded data within PDF files can be exploited to cause a buffer overflow.
- An error in the IPSec component does not verify the DNS name of an IPSec Hybrid Auth server against the certificate and can be exploited to spoof the server.
- An error in the Kernel component when parsing IGMP packets can be exploited to cause a kernel panic.
- An error in the Mobile Device Management component when handling a password passed via command-line to mdmclient can be exploited to disclose the password of other users.
- Some errors exist due to a bundled vulnerable version of OpenSSL.
- Some errors exist due to a bundled vulnerable version of PHP.
- Some errors exist due to a bundled vulnerable version of PostgreSQL.
- A boundary error in the QuickTime component when handling 'idsc' atoms in QuickTime movie files can be exploited to cause a memory corruption.
- An error in the Screen Lock component can be exploited to bypass the screen lock when another user is logged in.
Impact
- Cross-Site Scripting
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
- Spoofing
System / Technologies affected
- Apple OS X 10.6.x
- Apple OS X 10.7.x
- Apple OS X 10.8.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Apply the vendor patch available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at: http://www.apple.com/support/downloads/
Vulnerability Identifier
- CVE-2012-0883
- CVE-2012-2686
- CVE-2012-2687
- CVE-2012-3499
- CVE-2012-3817
- CVE-2012-4244
- CVE-2012-4558
- CVE-2012-5166
- CVE-2012-5688
- CVE-2013-0166
- CVE-2013-0169
- CVE-2013-1025
- CVE-2013-1026
- CVE-2013-1027
- CVE-2013-1028
- CVE-2013-1029
- CVE-2013-1030
- CVE-2013-1031
- CVE-2013-1032
- CVE-2013-1033
- CVE-2013-1635
- CVE-2013-1643
- CVE-2013-1775
- CVE-2013-1824
- CVE-2013-1899
- CVE-2013-1900
- CVE-2013-1901
- CVE-2013-2020
- CVE-2013-2021
- CVE-2013-2110
- CVE-2013-2266
Source
Related Link
Share with