![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.826551 |
Kategorie: | Mac OS X Local Security Checks |
Titel: | Apple Mac OS X Security Update (HT211849) - 02 |
Zusammenfassung: | Apple Mac OS X is prone to multiple vulnerabilities; according to Apple security advisory. |
Beschreibung: | Summary: Apple Mac OS X is prone to multiple vulnerabilities according to Apple security advisory. Vulnerability Insight: Multiple flaws exist due to, - A file access issue existed with certain home folder files. This was addressed with improved access restrictions. - A buffer overflow issue was addressed with improved memory handling. Vulnerability Impact: Successful exploitation of these vulnerabilities allow remote attackers to execute arbitrary code, bypass security restrictions, disclose sensitive information and cause a denial of service on affected system. Affected Software/OS: Apple Mac OS X versions, 10.15.x prior to 10.15.7. Solution: Upgrade Apple Mac OS X Catalina to 10.15.7 or later. Please see the references for more information. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-9986 http://seclists.org/fulldisclosure/2020/Nov/21 https://support.apple.com/kb/HT211849 Common Vulnerability Exposure (CVE) ID: CVE-2020-9954 https://support.apple.com/en-us/HT211843 https://support.apple.com/en-us/HT211844 https://support.apple.com/en-us/HT211849 https://support.apple.com/en-us/HT211850 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |