Skip to main content

Apple Mac OS X Multiple Vulnerabilities

Last Update Date: 16 Sep 2013 14:35 Release Date: 16 Sep 2013 3050 Views

RISK: High Risk

TYPE: Operating Systems - Mac OS

TYPE: Mac OS

Multiple vulnerabilities have been identified in Apple OS X. Which can be exploited by attacker to denial of service conditions, spoof IPSec servers, bypass access controls and compromise the target user's system.

  1. Some errors exist due to a bundled vulnerable version of Apache.
  2. Some errors exist due to a bundled vulnerable version of Bind.
  3. Some errors exist due to a bundled vulnerable version of ClamAV.
  4. A boundary error in the CoreGraphics component when handling JBIG2 encoded data within PDF files can be exploited to cause a buffer overflow.
  5. A boundary error in the ImageIO component when handling JBIG2 encoded data within PDF files can be exploited to cause a buffer overflow.
  6. An error in the IPSec component does not verify the DNS name of an IPSec Hybrid Auth server against the certificate and can be exploited to spoof the server.
  7. An error in the Kernel component when parsing IGMP packets can be exploited to cause a kernel panic.
  8. An error in the Mobile Device Management component when handling a password passed via command-line to mdmclient can be exploited to disclose the password of other users.
  9. Some errors exist due to a bundled vulnerable version of OpenSSL.
  10. Some errors exist due to a bundled vulnerable version of PHP.
  11. Some errors exist due to a bundled vulnerable version of PostgreSQL.
  12. A boundary error in the QuickTime component when handling 'idsc' atoms in QuickTime movie files can be exploited to cause a memory corruption.
  13. An error in the Screen Lock component can be exploited to bypass the screen lock when another user is logged in.

Impact

  • Cross-Site Scripting
  • Denial of Service
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure
  • Spoofing

System / Technologies affected

  • Apple OS X 10.6.x
  • Apple OS X 10.7.x
  • Apple OS X 10.8.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier


Source


Related Link