Skip to main content

Apple OS X Multiple Vulnerabilities

Last Update Date: 22 Oct 2014 Release Date: 20 Oct 2014 3915 Views

RISK: High Risk

TYPE: Operating Systems - Mac OS

TYPE: Mac OS

Multiple vulnerabilities have been identified in Apple OS X, which can be exploited by malicious users to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), gain escalated privileges and compromise a vulnerable system.

  1. The product bundles a vulnerable version of Apache HTTP Server.
  2. An error related to accessibility API can be exploited to bypass sandbox restrictions.
  3. The product bundles a vulnerable version of GNU Bash.
  4. An error related to Human Interface Device-class Bluetooth Low Energy devices pairing can be exploited to spoof a Bluetooth device.
  5. An error when unmounting an encrypted volume can be exploited to bypass the password protection by remounting the volume.
  6. The product bundles a vulnerable version of CUPS.
  7. A NULL pointer dereference error in the IntelAccelerator driver can be exploited to cause a crash.
  8. A NULL pointer dereference error in IOHIDFamily when handling key-mapping properties can be exploited to execute arbitrary code with kernel privileges.
  9. An error in IOHIDFamily when handling key-mapping properties can be exploited to cause a heap-based buffer overflow.
  10. An error in IOHIDFamily can be exploited to cause an out-of-bounds memory read access and a crash.
  11. An error in IOHIDFamily can be exploited to cause an out-of-bounds memory write access.
  12. An error in IOKit can be exploited to disclose certain kernel memory contents.
  13. An error when handling certain metadata fields of IODataQueue objects can be exploited to execute arbitrary code with kernel privileges.
  14. Multiple errors in the network statistics interface can be exploited to disclose certain kernel memory contents.
  15. An error when handling HFS resource forks can be exploited to cause a heap-based buffer overflow via a specially crafted HFS file system.
  16. A NULL pointer dereference error when handling HFS filenames can be exploited to cause a crash.
  17. A double-free error when handling Mach ports can be exploited to execute arbitrary code with kernel privileges.
  18. An error in rt_setgate can be exploited to cause an out-of-bounds memory read access and cause a crash.
  19. An error when handling certain messages sent to system control sockets can be exploited to cause kernel panic.
  20. An error related to the LaunchServices interface for setting content type handlers can be exploited to bypass sandbox restrictions.
  21. An error within Quicktime when handling audio streams in m4a files can be exploited to cause a buffer overflow.
  22. An error exists in the SSL 3.0 protocol.
  23. A NULL pointer dereference error when handling ASN.1 data can be exploited to cause a crash.
  24. An error in SecurityAgent can be exploited to gain access to another user's Kerberos tickets.
  25. An error when verifying app signatures can be exploited to bypass signature verification.

Impact

  • Denial of Service
  • Elevation of Privilege
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure
  • Spoofing

System / Technologies affected

  • Apple OS X

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to OS X Yosemite version 10.10

Vulnerability Identifier


Source


Related Link