CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
97.2%
The remote host is running Apple Mac OS X, but lacks Security Update 2006-004.
This security update contains fixes for the following applications :
AFP Server Bluetooth Bom DHCP dyld fetchmail gnuzip ImageIO LaunchServices OpenSSH telnet WebKit
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(22125);
script_version("1.24");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/28");
script_cve_id("CVE-2005-0488", "CVE-2005-0988", "CVE-2005-1228", "CVE-2005-2335", "CVE-2005-3088",
"CVE-2005-4348", "CVE-2006-0321", "CVE-2006-0392", "CVE-2006-0393", "CVE-2006-1472",
"CVE-2006-1473", "CVE-2006-3459", "CVE-2006-3461", "CVE-2006-3462", "CVE-2006-3465",
"CVE-2006-3495", "CVE-2006-3496", "CVE-2006-3497", "CVE-2006-3498", "CVE-2006-3499",
"CVE-2006-3500", "CVE-2006-3501", "CVE-2006-3502", "CVE-2006-3503", "CVE-2006-3504",
"CVE-2006-3505");
script_bugtraq_id(19289);
script_name(english:"Mac OS X Multiple Vulnerabilities (Security Update 2006-004)");
script_summary(english:"Check for Security Update 2006-004");
script_set_attribute(attribute:"synopsis", value:"The remote operating system is missing a vendor-supplied patch.");
script_set_attribute(attribute:"description", value:
"The remote host is running Apple Mac OS X, but lacks
Security Update 2006-004.
This security update contains fixes for the following
applications :
AFP Server
Bluetooth
Bom
DHCP
dyld
fetchmail
gnuzip
ImageIO
LaunchServices
OpenSSH
telnet
WebKit");
# http://web.archive.org/web/20070728033955/http://docs.info.apple.com/article.html?artnum=304063
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6e97e41a");
script_set_attribute(attribute:"solution", value:
"Mac OS X 10.4 :
http://www.apple.com/support/downloads/securityupdate2006004macosx1047clientintel.html
http://www.apple.com/support/downloads/securityupdate2006004macosx1047clientppc.html
Mac OS X 10.3 :
http://www.apple.com/support/downloads/securityupdate20060041039client.html
http://www.apple.com/support/downloads/securityupdate20060041039server.html");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploited_by_malware", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Apple iOS MobileMail LibTIFF Buffer Overflow');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2006/06/26");
script_set_attribute(attribute:"patch_publication_date", value:"2006/08/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2006/08/01");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x:10.3");
script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x:10.4");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2006-2024 Tenable Network Security, Inc.");
script_family(english:"MacOS X Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/MacOSX/packages");
exit(0);
}
packages = get_kb_item("Host/MacOSX/packages");
if ( ! packages ) exit(0);
uname = get_kb_item("Host/uname");
if ( egrep(pattern:"Darwin.* (7\.[0-9]\.|8\.[0-7]\.)", string:uname) )
{
if (!egrep(pattern:"^SecUpd(Srvr)?(2006-00[467]|2007-00[38])", string:packages)) security_hole(0);
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0488
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0988
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2335
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3088
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4348
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0321
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0392
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1472
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1473
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3459
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3461
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3462
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3465
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3495
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3496
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3497
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3498
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3499
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3500
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3501
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3502
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3503
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3504
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3505
www.nessus.org/u?6e97e41a