语言:
http://www.zerodayinitiative.com/advisories/ZDI-13-111/
http://www.zerodayinitiative.com/advisories/ZDI-13-119/
http://www.zerodayinitiative.com/advisories/ZDI-13-150/
http://support.apple.com/kb/HT5784
http://lists.apple.com/archives/security-announce/2013/Jun/msg00000.html
严重性: Critical
ID: 66809
文件名: macosx_SecUpd2013-002.nasl
版本: 1.22
类型: local
代理: macosx
发布时间: 2013/6/5
最近更新时间: 2019/11/27
支持的传感器: Nessus Agent, Nessus
风险因素: High
分数: 7.4
风险因素: Critical
基本分数: 10
时间分数: 8.3
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2013-0277
CPE: cpe:/o:apple:mac_os_x
必需的 KB 项: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms
可利用: true
易利用性: Exploits are available
补丁发布日期: 2013/6/4
漏洞发布日期: 2011/5/17
Core Impact
Metasploit (Ruby on Rails JSON Processor YAML Deserialization Code Execution)
CVE: CVE-2011-1945, CVE-2011-3207, CVE-2011-3210, CVE-2011-4108, CVE-2011-4109, CVE-2011-4576, CVE-2011-4577, CVE-2011-4619, CVE-2012-0050, CVE-2012-2110, CVE-2012-2131, CVE-2012-2333, CVE-2012-4929, CVE-2013-0155, CVE-2013-0276, CVE-2013-0277, CVE-2013-0333, CVE-2013-0975, CVE-2013-0984, CVE-2013-0986, CVE-2013-0987, CVE-2013-0988, CVE-2013-0990, CVE-2013-1024, CVE-2013-1854, CVE-2013-1855, CVE-2013-1856, CVE-2013-1857
BID: 60100, 60328, 60365, 60368, 60369, 47888, 49469, 49471, 51281, 51563, 53158, 53212, 53476, 55704, 57192, 57575, 57896, 57898, 58549, 58552, 58554, 58555, 60099
APPLE-SA: APPLE-SA-2013-06-04-1