Apple OS X Multiple Vulnerabilities
Last Update Date:
22 Oct 2014
Release Date:
20 Oct 2014
3915
Views
RISK: High Risk
TYPE: Operating Systems - Mac OS
Multiple vulnerabilities have been identified in Apple OS X, which can be exploited by malicious users to disclose potentially sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), gain escalated privileges and compromise a vulnerable system.
- The product bundles a vulnerable version of Apache HTTP Server.
- An error related to accessibility API can be exploited to bypass sandbox restrictions.
- The product bundles a vulnerable version of GNU Bash.
- An error related to Human Interface Device-class Bluetooth Low Energy devices pairing can be exploited to spoof a Bluetooth device.
- An error when unmounting an encrypted volume can be exploited to bypass the password protection by remounting the volume.
- The product bundles a vulnerable version of CUPS.
- A NULL pointer dereference error in the IntelAccelerator driver can be exploited to cause a crash.
- A NULL pointer dereference error in IOHIDFamily when handling key-mapping properties can be exploited to execute arbitrary code with kernel privileges.
- An error in IOHIDFamily when handling key-mapping properties can be exploited to cause a heap-based buffer overflow.
- An error in IOHIDFamily can be exploited to cause an out-of-bounds memory read access and a crash.
- An error in IOHIDFamily can be exploited to cause an out-of-bounds memory write access.
- An error in IOKit can be exploited to disclose certain kernel memory contents.
- An error when handling certain metadata fields of IODataQueue objects can be exploited to execute arbitrary code with kernel privileges.
- Multiple errors in the network statistics interface can be exploited to disclose certain kernel memory contents.
- An error when handling HFS resource forks can be exploited to cause a heap-based buffer overflow via a specially crafted HFS file system.
- A NULL pointer dereference error when handling HFS filenames can be exploited to cause a crash.
- A double-free error when handling Mach ports can be exploited to execute arbitrary code with kernel privileges.
- An error in rt_setgate can be exploited to cause an out-of-bounds memory read access and cause a crash.
- An error when handling certain messages sent to system control sockets can be exploited to cause kernel panic.
- An error related to the LaunchServices interface for setting content type handlers can be exploited to bypass sandbox restrictions.
- An error within Quicktime when handling audio streams in m4a files can be exploited to cause a buffer overflow.
- An error exists in the SSL 3.0 protocol.
- A NULL pointer dereference error when handling ASN.1 data can be exploited to cause a crash.
- An error in SecurityAgent can be exploited to gain access to another user's Kerberos tickets.
- An error when verifying app signatures can be exploited to bypass signature verification.
Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
- Spoofing
System / Technologies affected
- Apple OS X
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to OS X Yosemite version 10.10
Vulnerability Identifier
- CVE-2011-2391
- CVE-2013-6438
- CVE-2014-0098
- CVE-2014-3537
- CVE-2014-3566
- CVE-2014-4351
- CVE-2014-4371
- CVE-2014-4373
- CVE-2014-4375
- CVE-2014-4380
- CVE-2014-4388
- CVE-2014-4391
- CVE-2014-4404
- CVE-2014-4405
- CVE-2014-4407
- CVE-2014-4408
- CVE-2014-4418
- CVE-2014-4419
- CVE-2014-4420
- CVE-2014-4421
- CVE-2014-4427
- CVE-2014-4428
- CVE-2014-4430
- CVE-2014-4433
- CVE-2014-4434
- CVE-2014-4436
- CVE-2014-4437
- CVE-2014-4442
- CVE-2014-4443
- CVE-2014-4444
- CVE-2014-6271
- CVE-2014-7169
Source
Related Link
Share with