语言:
https://support.apple.com/en-us/HT204244
http://www.securityfocus.com/archive/1/534559
https://www.imperialviolet.org/2014/10/14/poodle.html
https://www.openssl.org/~bodo/ssl-poodle.pdf
https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00
严重性: Critical
ID: 81088
文件名: macosx_SecUpd2015-001.nasl
版本: 1.15
类型: local
代理: macosx
发布时间: 2015/1/29
最近更新时间: 2019/6/19
支持的传感器: Nessus Agent, Nessus
风险因素: High
分数: 7.4
风险因素: Critical
基本分数: 10
时间分数: 8.3
矢量: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 分数来源: CVE-2014-4486
风险因素: Critical
基本分数: 9.8
时间分数: 9.1
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间矢量: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/o:apple:mac_os_x
必需的 KB 项: Host/local_checks_enabled, Host/MacOSX/Version, Host/MacOSX/packages/boms
可利用: true
易利用性: Exploits are available
补丁发布日期: 2015/1/27
漏洞发布日期: 2013/9/18
Metasploit (tnftp "savefile" Arbitrary Command Execution)
CVE: CVE-2011-2391, CVE-2014-3566, CVE-2014-3567, CVE-2014-3568, CVE-2014-4426, CVE-2014-4461, CVE-2014-4481, CVE-2014-4483, CVE-2014-4484, CVE-2014-4485, CVE-2014-4486, CVE-2014-4487, CVE-2014-4488, CVE-2014-4489, CVE-2014-4491, CVE-2014-4492, CVE-2014-4495, CVE-2014-4497, CVE-2014-7861, CVE-2014-8517, CVE-2014-8816, CVE-2014-8817, CVE-2014-8819, CVE-2014-8820, CVE-2014-8821, CVE-2014-8822, CVE-2014-8824, CVE-2014-8826, CVE-2014-8827, CVE-2014-8828, CVE-2014-8829, CVE-2014-8830, CVE-2014-8831, CVE-2014-8832, CVE-2014-8835, CVE-2014-8838
BID: 62531, 70249, 70574, 70585, 70586, 70623, 70792, 71136, 72327, 72328
APPLE-SA: APPLE-SA-2015-01-27-4
CERT: 577193