![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.812664 |
Kategorie: | Mac OS X Local Security Checks |
Titel: | Apple Mac OS X Multiple Vulnerabilities-03 (HT208465) |
Zusammenfassung: | Apple Mac OS X is prone to multiple vulnerabilities. |
Beschreibung: | Summary: Apple Mac OS X is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - A memory corruption issues. - A logic issue. - A resource exhaustion issue. - A certificate evaluation issue in the handling of name constraints. Vulnerability Impact: Successful exploitation will allow an attacker to execute arbitrary code on the affected system, lead to application denial of service, use certificate having name constraints applied incorrectly. Affected Software/OS: Apple Mac OS X version 10.13.x prior to 10.13.3, 10.12.x through 10.12.6 before build 16G1212 Solution: Upgrade to Apple Mac OS X version 10.13.3 or apply the appropriate patch. CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2018-4094 BugTraq ID: 102782 http://www.securityfocus.com/bid/102782 http://www.securitytracker.com/id/1040265 http://www.securitytracker.com/id/1040267 Common Vulnerability Exposure (CVE) ID: CVE-2018-4097 BugTraq ID: 102785 http://www.securityfocus.com/bid/102785 Common Vulnerability Exposure (CVE) ID: CVE-2018-4100 BugTraq ID: 102772 http://www.securityfocus.com/bid/102772 Common Vulnerability Exposure (CVE) ID: CVE-2018-4086 |
Copyright | Copyright (C) 2018 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |