Beschreibung
Multiple serious vulnerabilities have been found in Apple OS X. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, bypass security restrictions, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Unsafe password storage can be exploited remotely via files manipulation;
- Unencrypted requests sending can be exploited remotely via network manipulations;
- Improper signatures validation can be exploited locally via a specially designed bundle;
- Buffer overdlow can be exploited locally via a specially designed Uniform Type Identifier and other unspecified vectors;
- Unknown vulnerabilities can be exploited locally via a specially designed .SGI file, localized strings or localization data;
- Unknown vulnerabilities can be exploited locally via an unspecified vectors related to NVIDIA graphics, Apple Type Services, kernel and Hypervisor;
- Use-adter-free vulnerability cab ve exloited remotely via mutex manipulations.
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-1140 high
- CVE-2015-1139 high
- CVE-2015-1145 high
- CVE-2015-1148 high
- CVE-2015-1147 high
- CVE-2015-1146 high
- CVE-2015-1138 high
- CVE-2015-1144 high
- CVE-2015-1143 high
- CVE-2015-1142 high
- CVE-2015-1141 high
- CVE-2015-1135 high
- CVE-2015-1133 high
- CVE-2015-1136 high
- CVE-2015-1134 high
- CVE-2015-1137 high
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!