![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.812402 |
Kategorie: | Mac OS X Local Security Checks |
Titel: | Apple Mac OS X Security Updates (HT208331)-03 |
Zusammenfassung: | Apple Mac OS X is prone to a privilege escalation vulnerability. |
Beschreibung: | Summary: Apple Mac OS X is prone to a privilege escalation vulnerability. Vulnerability Insight: Multiple flaws exist due to, - Permissions issue in the handling of screen sharing sessions. - A logic error existed in the validation of credentials. Vulnerability Impact: Successful exploitation will allow remote attackers to access any file readable by root and bypass administrator authentication. Affected Software/OS: Apple Mac OS X versions 10.13.x through 10.13.1 and 10.12.x through 10.12.6 prior to Security Update 2017-002 Sierra. Solution: For Apple Mac OS X version 10.13.x before 10.13.2 update to 10.13.2 and for versions 10.12.x through 10.12.6 apply Security Update 2017-002 Sierra. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-13872 BugTraq ID: 101981 http://www.securityfocus.com/bid/101981 https://www.exploit-db.com/exploits/43201/ https://www.exploit-db.com/exploits/43248/ https://arstechnica.com/information-technology/2017/11/macos-bug-lets-you-log-in-as-admin-with-no-password-required/ https://github.com/rapid7/metasploit-framework/pull/9302 https://objective-see.com/blog/blog_0x24.html https://support.apple.com/HT208315 https://www.wired.com/story/macos-update-undoes-apple-root-bug-patch/ http://www.securitytracker.com/id/1039875 Common Vulnerability Exposure (CVE) ID: CVE-2017-7158 |
Copyright | Copyright (C) 2017 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |