語系:
http://www.zerodayinitiative.com/advisories/ZDI-13-111/
http://www.zerodayinitiative.com/advisories/ZDI-13-119/
http://www.zerodayinitiative.com/advisories/ZDI-13-150/
http://support.apple.com/kb/HT5784
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
嚴重性: Critical
ID: 66809
檔案名稱: macosx_SecUpd2013-002.nasl
版本: 1.23
類型: local
代理程式: macosx
已發布: 2013/6/5
已更新: 2024/5/28
支援的感應器: Nessus Agent, Nessus
風險因素: High
分數: 7.4
風險因素: Critical
基本分數: 10
時間分數: 8.3
媒介: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 評分資料來源: CVE-2013-0277
CPE: cpe:/o:apple:mac_os_x:10.6, cpe:/o:apple:mac_os_x:10.7
必要的 KB 項目: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms
可被惡意程式利用: true
可輕鬆利用: Exploits are available
修補程式發佈日期: 2013/6/4
弱點發布日期: 2011/5/17
Core Impact
Metasploit (Ruby on Rails JSON Processor YAML Deserialization Code Execution)
CVE: CVE-2011-1945, CVE-2011-3207, CVE-2011-3210, CVE-2011-4108, CVE-2011-4109, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2012-0050, CVE-2012-2110, CVE-2012-2131, CVE-2012-2333, CVE-2012-4929, CVE-2013-0155, CVE-2013-0276, CVE-2013-0277, CVE-2013-0333, CVE-2013-0975, CVE-2013-0984, CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0990, CVE-2013-1024, CVE-2013-1854, CVE-2013-1855, CVE-2013-1856, CVE-2013-1857
BID: 51281, 51563, 53158, 53212, 53476, 55704, 57192, 57575, 57896, 57898, 58549, 58552, 58554, 58555, 60099, 60100, 60328, 60365, 60368, 60369, 47888, 49469, 49471
APPLE-SA: APPLE-SA-2013-06-04-1