The twelfth major release of Apple's flagship desktop and server operating system dropped on September 30th, 2015, bringing with it a host of new and improved features like Split View, a smarter Spotlight, Metal for Core Graphics, and under-the-hood performance improvements, among others. Alas, benefits do not without a price—in this case, myriad of security issues and exploitable vulnerabilities. The following are the top 10 of the lot followed by remediation tips.
1. Accelerate Framework Vulnerability
The Accelate Framework consists of C APIs for vector and matrix math, digital signal processing, large number handling, and image processing. In multi-threading mode, security flaws could lead to arbitrary code execution or memory corruption and denial-of-service (DoS) when visiting a maliciously crafted website.
2. Kernal Virtual Memory Vulnerability
Apple's virtual memory kicks in when real memory (RAM) runs low, tapping into free hard disk space as a temporary memory source. A kernal issue in OS X El Capitan involving the mishandling of memory reuse could allow attackers to cause a DoS via a local, crafted application.
3. Core Audio Vulnerability
The Core Audio framework consists of a set of software interfaces for audio features in applications for OS X. Unfortunately, coreaudiod—the BSD process for this service—does not initialize an unspecified data structure, which could ultimately allow an attacker to execute arbitrary malicious code via a specially crafted application.
4. apache_mod_php Vulnerabilities
The Apache web server and PHP comes preinstalled with OS X El Capitan. Multiple vulnerabilities in apache_mod_php could allow remote attackers to execute arbitrary code by either exploiting the faulty php_date_timezone_initialize_from_hash function or the __nss_hostname_digits_dots function in glibc 2.2.
5. CFNetwork Vulnerability
CFNetwork is a framework in Core Services that provides a library of abstractions for network protocols. The flaw in question involves its inability to distinguish uppercase versus lowercase during cookie parsing, which could allow remote web servers to overwrite cookies via unspecified vectors.
6. Core Graphics Vulnerabilities
Core Graphics—also known as Quartz—is a set of graphics-related APIs for OS X that forms the basis of 2-D graphics rendering. In OS X El Capitan, multiple flaws in the Core Graphics component could allow remote attackers to execute arbitrary code or cause a DoS (memory corruption) via a specially crafted web site.
7. Core Text Vulnerabilities
Core Text is OS X's text engine/programming interface that enables fine-
8. Grand Central Dispatch Vulnerability
Grand Central Dispatch (GCD) optimizes application support for systems with multi-core processors and other symmetric multiprocessing systems. A flaw in GCD could allow attackers to execute arbitrary code or cause a DoS (memory corruption) with a specially crafted package mishandled during dispatch calls.
9. MCX Application Restriction Vulnerability
MCX—or Managed Clients for OS X—allows a network administrator or operator to define important preference settings on a master management server and propagate said settings automatically to new machines connecting to the network. This particular vulnerability could allow attackers to execute arbitrary code or cause a DoS (memory corruption) with a specially crafted package that is mishandled during dispatch calls.
10. Security Agent Vulnerability
Security Agent is a process that provides the user interface for the Security Server in OS X, used primarily for requesting authentication when an application requests additional privileges. A malicious application could exploit a flaw in Security Agent to programmatically control keychain access prompts.
Upgrading to OS X El Capitan 10.11.1 can effectively remediate these vulnerabilities; that said, such security flaws in infrastructures with large, disparate OS X environments can be difficult to address. ScriptRock's comprehensive vulnerability scanner can automatically scan and identify the aforementioned vulnerabilities and more through policy-driven testing. Try it out today—it's free for up to 10 nodes.