SB2015041003 - Multiple vulnerabilities in Apple MAC OS X
Published: April 10, 2015 Updated: July 23, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 11 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2015-1147)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Open Directory Client in Apple OS X before 10.10.3 sends unencrypted password-change requests in certain circumstances involving missing certificates, which allows remote attackers to obtain sensitive information by sniffing the network.
2) Cryptographic issues (CVE-ID: CVE-2015-1146)
The vulnerability allows a local non-authenticated attacker to manipulate data.
The Code Signing implementation in Apple OS X before 10.10.3 does not properly validate signatures, which allows local users to bypass intended access restrictions via a crafted bundle, a different vulnerability than CVE-2015-1145.
3) Cryptographic issues (CVE-ID: CVE-2015-1145)
The vulnerability allows a local non-authenticated attacker to manipulate data.
The Code Signing implementation in Apple OS X before 10.10.3 does not properly validate signatures, which allows local users to bypass intended access restrictions via a crafted bundle, a different vulnerability than CVE-2015-1146.
4) Buffer overflow (CVE-ID: CVE-2015-1140)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
Buffer overflow in IOHIDFamily in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors.
5) Input validation error (CVE-ID: CVE-2015-1139)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
ImageIO in Apple OS X before 10.10.3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted .sgi file.
6) Input validation error (CVE-ID: CVE-2015-1135)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1132, CVE-2015-1133, and CVE-2015-1134.
7) Input validation error (CVE-ID: CVE-2015-1134)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1132, CVE-2015-1133, and CVE-2015-1135.
8) Input validation error (CVE-ID: CVE-2015-1133)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1132, CVE-2015-1134, and CVE-2015-1135.
9) Input validation error (CVE-ID: CVE-2015-1132)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1131, CVE-2015-1133, CVE-2015-1134, and CVE-2015-1135.
10) Input validation error (CVE-ID: CVE-2015-1131)
The vulnerability allows a local non-authenticated attacker to execute arbitrary code.
fontd in Apple Type Services (ATS) in Apple OS X before 10.10.3 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-1132, CVE-2015-1133, CVE-2015-1134, and CVE-2015-1135.
11) Input validation error (CVE-ID: CVE-2015-1137)
The vulnerability allows local users to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can gain privileges or cause a denial of service (NULL pointer dereference) via an unspecified IOService userclient type.
Remediation
Install update from vendor's website.