Description: | Summary: Apple Mac OS X is prone to multiple vulnerabilities.
Vulnerability Insight: Multiple flaws are due to:
- Permanent cookies were saved after quitting Safari, even when Private Browsing was enabled.
- An unbounded stack allocation issue existed in the handling of text glyphs.
- A privilege escalation issue existed in the handling of CUPS configuration via the CUPS web interface.
- A local user who is not an administrator may disable FileVault using the command-line.
- A buffer overflow existed in the handling of MP3 files.
- A buffer overflow existed in the handling of FPX files.
- A memory corruption issue existed in the handling of QTIF files.
- A buffer overflow existed in the handling of 'enof' atoms.
- Multiple errors in OpenSSL.
- There were known attacks on the confidentiality of TLS 1.0 when compression was enabled.
- An uninitialized memory access issue existed in the handling of text tracks.
- A buffer overflow existed in the handling of PICT images.
- If SMB file sharing is enabled, an authenticated user may be able to write files outside the shared directory.
Vulnerability Impact: Successful exploitation will allow attackers to, execute arbitrary code or cause a denial of service or lead to an unexpected application termination.
Affected Software/OS: Apple Mac OS X version 10.8 to 10.8.3, 10.7 to 10.7.5 and 10.6.8
Solution: Upgrade to Apple Mac OS X version 10.8.4 or later or apply appropriate security update for 10.7 and 10.6 versions. Please see the references for more information.
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|