Описание
Multiple serious vulnerabilities have been found in Apple OS X. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, bypass security restrictions, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Unsafe password storage can be exploited remotely via files manipulation;
- Unencrypted requests sending can be exploited remotely via network manipulations;
- Improper signatures validation can be exploited locally via a specially designed bundle;
- Buffer overdlow can be exploited locally via a specially designed Uniform Type Identifier and other unspecified vectors;
- Unknown vulnerabilities can be exploited locally via a specially designed .SGI file, localized strings or localization data;
- Unknown vulnerabilities can be exploited locally via an unspecified vectors related to NVIDIA graphics, Apple Type Services, kernel and Hypervisor;
- Use-adter-free vulnerability cab ve exloited remotely via mutex manipulations.
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2015-1140 high
- CVE-2015-1139 high
- CVE-2015-1145 warning
- CVE-2015-1148 critical
- CVE-2015-1147 critical
- CVE-2015-1146 warning
- CVE-2015-1138 warning
- CVE-2015-1144 high
- CVE-2015-1143 high
- CVE-2015-1142 warning
- CVE-2015-1141 warning
- CVE-2015-1135 high
- CVE-2015-1133 high
- CVE-2015-1136 high
- CVE-2015-1134 high
- CVE-2015-1137 high
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!