Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.816619
Kategorie:Mac OS X Local Security Checks
Titel:Apple Mac OS X Security Update (HT210919) - 03
Zusammenfassung:Apple Mac OS X is prone to multiple vulnerabilities.
Beschreibung:Summary:
Apple Mac OS X is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to:

- Missing checks by Gatekeeper on files mounted through a network share.

- An off by one issue existed in the handling of racoon configuration files.

- A memory initialization issue related to improper memory handling.

- A validation issue related to improper input sanitization.

- A memory corruption issue related to improper memory handling.

- An out-of-bounds read error related to improper input validation.

Vulnerability Impact:
Successful exploitation allows attackers
to conduct arbitrary code execution, read restricted memory and cause denial
of service.

Affected Software/OS:
Apple Mac OS X versions 10.15.x through 10.15.2

Solution:
Update to Apple Mac OS X 10.15.3 or later.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2020-3866
https://support.apple.com/HT210919
Common Vulnerability Exposure (CVE) ID: CVE-2020-3840
https://support.apple.com/HT210918
https://support.apple.com/HT210920
Common Vulnerability Exposure (CVE) ID: CVE-2020-3872
https://support.apple.com/HT210921
Common Vulnerability Exposure (CVE) ID: CVE-2020-3839
Common Vulnerability Exposure (CVE) ID: CVE-2020-3837
Common Vulnerability Exposure (CVE) ID: CVE-2020-3854
Common Vulnerability Exposure (CVE) ID: CVE-2020-3857
Common Vulnerability Exposure (CVE) ID: CVE-2020-3877
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.