Top 10 OS X El Capitan Security Flaws and Remediation Tips

Posted by UpGuard

The twelfth major release of Apple's flagship desktop and server operating system dropped on September 30th, 2015, bringing with it a host of new and improved features like Split View, a smarter Spotlight, Metal for Core Graphics, and under-the-hood performance improvements, among others. Alas, benefits do not without a price—in this case, myriad of security issues and exploitable vulnerabilities. The following are the top 10 of the lot followed by remediation tips.

1. Accelerate Framework Vulnerability

CVE-2015-5940

The Accelate Framework consists of C APIs for vector and matrix math, digital signal processing, large number handling, and image processing. In multi-threading mode, security flaws could lead to arbitrary code execution or memory corruption and denial-of-service (DoS) when visiting a maliciously crafted website.

2. Kernal Virtual Memory Vulnerability

CVE-2015-6994

Apple's virtual memory kicks in when real memory (RAM) runs low, tapping into free hard disk space as a temporary memory source. A kernal issue in OS X El Capitan involving the mishandling of memory reuse could allow attackers to cause a DoS via a local, crafted application.

3. Core Audio Vulnerability

CVE-2015-7003

The Core Audio framework consists of a set of software interfaces for audio features in applications for OS X. Unfortunately, coreaudiod—the BSD process for this servicedoes not initialize an unspecified data structure, which could ultimately allow an attacker to execute arbitrary malicious code via a specially crafted application.

4. apache_mod_php Vulnerabilities

CVE-2015-0235, CVE-2015-02733

The Apache web server and PHP comes preinstalled with OS X El Capitan. Multiple vulnerabilities in apache_mod_php could allow remote attackers to execute arbitrary code by either exploiting the faulty php_date_timezone_initialize_from_hash function or the __nss_hostname_digits_dots function in glibc 2.2.

5. CFNetwork Vulnerability

CVE-2015-7023

CFNetwork is a framework in Core Services that provides a library of abstractions for network protocols. The flaw in question involves its inability to distinguish uppercase versus lowercase during cookie parsing, which could allow remote web servers to overwrite cookies via unspecified vectors.

is your CSTAR score good?

6. Core Graphics Vulnerabilities 

CVE-2015-5925, CVE-2015-5926

Core Graphicsalso known as Quartz—is a set of graphics-related APIs for OS X  that forms the basis of 2-D graphics rendering. In OS X El Capitan, multiple flaws in the Core Graphics component could allow remote attackers to execute arbitrary code or cause a DoS (memory corruption) via a specially crafted web site.

7. Core Text Vulnerabilities 

CVE-2015-6992, CVE-2015-6975, CVE-2015-5944

Core Text is OS X's text engine/programming interface that enables fine-grained control over text layout, formatting, and font-related operations. Multiple vulnerabilities in the latter could allow remote attackers to execute arbitrary code or cause a DoS (memory corruption) with a specially crafted font file.

8. Grand Central Dispatch Vulnerability 

CVE-2015-6989

Grand Central Dispatch (GCD) optimizes application support for systems with multi-core processors and other symmetric multiprocessing systems. A flaw in GCD could allow attackers to execute arbitrary code or cause a DoS (memory corruption) with a specially crafted package mishandled during dispatch calls.

9. MCX Application Restriction Vulnerability 

CVE-2015-7016

MCXor Managed Clients for OS X—allows a network administrator or operator to define important preference settings on a master management server and propagate said settings automatically to new machines connecting to the network. This particular vulnerability could allow attackers to execute arbitrary code or cause a DoS (memory corruption) with a specially crafted package that is mishandled during dispatch calls.

10. Security Agent Vulnerability 

CVE-2015-5943

Security Agent is a process that provides the user interface for the Security Server in OS X, used primarily for requesting authentication when an application requests additional privileges. A malicious application could exploit a flaw in Security Agent to programmatically control keychain access prompts.

Remediation 

Upgrading to OS X El Capitan 10.11.1 can effectively remediate these vulnerabilities; that said, such security flaws in infrastructures with large, disparate OS X environments can be difficult to address. ScriptRock's comprehensive vulnerability scanner can automatically scan and identify the aforementioned vulnerabilities and more through policy-driven testing. Try it out today—it's free for up to 10 nodes.

Get a Guided UpGuard Demo

Source(s):

https://support.apple.com/en-us/HT205375

https://www.bignerdranch.com/blog/core-graphics-part-1-in-the-beginning/

http://www.raywenderlich.com/4147/core-text-tutorial-for-ios-making-a-magazine-app

http://www.bresink.com/osx/300268194/Docs-en/pgs/0050-MCX.html

https://developer.apple.com/library/mac/documentation/Security/Conceptual/Security_Overview/Architecture/Architecture.html

 

 

 

 

UpGuard customers