The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Apple macOS Sierra

computer vulnerability alert CVE-2018-4187 CVE-2018-4206 CVE-2018-8897

Apple macOS: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Apple macOS.
Impacted products: Mac OS X.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on server.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 3.
Creation date: 25/04/2018.
Identifiers: CERTFR-2018-AVI-201, CVE-2018-4187, CVE-2018-4206, CVE-2018-8897, HT208742, HT208849, VIGILANCE-VUL-25966.

Description of the vulnerability

An attacker can use several vulnerabilities of Apple macOS.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-6797

Perl Core: buffer overflow via S_regatom

Synthesis of the vulnerability

An attacker can generate a buffer overflow via S_regatom of Perl Core, in order to trigger a denial of service, and possibly to run code.
Impacted products: Mac OS X, Debian, Fedora, OpenBSD, openSUSE Leap, Solaris, Perl Core, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 3/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 16/04/2018.
Identifiers: 132227, bulletinjan2019, CVE-2018-6797, DSA-4172-1, FEDORA-2018-0050f7c0d1, FEDORA-2018-1c8b49fbc7, FEDORA-2018-d1ba58394e, HT208937, HT209193, openSUSE-SU-2018:1095-1, RHSA-2018:1192-01, SUSE-SU-2018:1972-1, USN-3625-1, USN-3625-2, VIGILANCE-VUL-25877.

Description of the vulnerability

An attacker can generate a buffer overflow via S_regatom of Perl Core, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-6913

Perl Core: buffer overflow via S_pack_rec

Synthesis of the vulnerability

An attacker can generate a buffer overflow via S_pack_rec of Perl Core, in order to trigger a denial of service, and possibly to run code.
Impacted products: Mac OS X, Debian, Fedora, OpenBSD, openSUSE Leap, Solaris, Perl Core, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 3/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 16/04/2018.
Identifiers: 131844, bulletinjan2019, CVE-2018-6913, DLA-1345-1, DSA-4172-1, FEDORA-2018-0050f7c0d1, FEDORA-2018-1c8b49fbc7, FEDORA-2018-d1ba58394e, HT208937, openSUSE-SU-2018:1095-1, SUSE-SU-2018:1972-1, USN-3625-1, USN-3625-2, VIGILANCE-VUL-25875.

Description of the vulnerability

The Perl Core product offers a web service.

However, if the size of data is greater than the size of the storage array, an overflow occurs.

An attacker can therefore generate a buffer overflow via S_pack_rec of Perl Core, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2017-17742 CVE-2018-6914 CVE-2018-8777

Ruby: six vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Ruby.
Impacted products: Mac OS X, Debian, openSUSE Leap, Solaris, Puppet, RHEL, Slackware, SLES, Ubuntu.
Severity: 3/4.
Consequences: user access/rights, data reading, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 6.
Creation date: 30/03/2018.
Identifiers: bulletinjan2019, CVE-2017-17742, CVE-2018-6914, CVE-2018-8777, CVE-2018-8778, CVE-2018-8779, CVE-2018-8780, DLA-1358-1, DLA-1359-1, DLA-1421-1, DSA-4259-1, HT208937, HT209193, openSUSE-SU-2019:1771-1, RHSA-2018:3729-01, RHSA-2018:3730-01, RHSA-2018:3731-01, RHSA-2019:2028-01, SSA:2018-088-01, SUSE-SU-2019:1804-1, USN-3626-1, USN-3685-1, VIGILANCE-VUL-25737.

Description of the vulnerability

An attacker can use several vulnerabilities of Ruby.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2017-13890 CVE-2017-13911 CVE-2017-7151

Apple macOS: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Apple macOS.
Impacted products: Mac OS X.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, data reading, data creation/edition, data deletion, denial of service on server.
Provenance: document.
Number of vulnerabilities in this bulletin: 39.
Creation date: 30/03/2018.
Identifiers: CERTFR-2018-AVI-162, CVE-2017-13890, CVE-2017-13911, CVE-2017-7151, CVE-2018-4104, CVE-2018-4105, CVE-2018-4106, CVE-2018-4107, CVE-2018-4108, CVE-2018-4111, CVE-2018-4112, CVE-2018-4115, CVE-2018-4131, CVE-2018-4132, CVE-2018-4135, CVE-2018-4136, CVE-2018-4138, CVE-2018-4139, CVE-2018-4142, CVE-2018-4143, CVE-2018-4144, CVE-2018-4150, CVE-2018-4151, CVE-2018-4152, CVE-2018-4154, CVE-2018-4155, CVE-2018-4156, CVE-2018-4157, CVE-2018-4158, CVE-2018-4160, CVE-2018-4166, CVE-2018-4167, CVE-2018-4170, CVE-2018-4173, CVE-2018-4174, CVE-2018-4175, CVE-2018-4176, CVE-2018-4179, CVE-2018-4185, CVE-2018-4298, HT208692, VIGILANCE-VUL-25727.

Description of the vulnerability

An attacker can use several vulnerabilities of Apple macOS.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2018-7584

PHP: buffer overflow

Synthesis of the vulnerability

An attacker can generate a buffer overflow of PHP, in order to trigger a denial of service, and possibly to run code.
Impacted products: Mac OS X, Debian, Fedora, openSUSE Leap, Solaris, PHP, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, denial of service on service, denial of service on client.
Provenance: internet server.
Creation date: 01/03/2018.
Identifiers: 75981, bulletinapr2018, CERTFR-2018-AVI-109, CVE-2018-7584, DLA-1326-1, DLA-1397-1, DSA-4240-1, FEDORA-2018-a89ccf7133, FEDORA-2018-e8bc8d2784, HT208849, openSUSE-SU-2018:0657-1, openSUSE-SU-2018:0725-1, RHSA-2019:2519-01, SUSE-SU-2018:0806-1, USN-3600-1, USN-3600-2, VIGILANCE-VUL-25412.

Description of the vulnerability

An attacker can generate a buffer overflow of PHP, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2017-5753 CVE-2018-3693

Processors: memory reading via Spectre Bounds Check

Synthesis of the vulnerability

A local attacker can access to the kernel memory, in order to read sensitive information.
Impacted products: SNS, iOS by Apple, Mac OS X, Blue Coat CAS, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, ConnectPort TSx, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, Chrome, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, Firefox, openSUSE Leap, Opera, Oracle Communications, Solaris, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, vCenter Server, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Xen.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Number of vulnerabilities in this bulletin: 2.
Creation date: 05/01/2018.
Revision date: 21/02/2018.
Identifiers: 2016636, 519675, ADV180002, bulletinjan2018, bulletinjul2018, CERTFR-2018-AVI-004, CERTFR-2018-AVI-005, CERTFR-2018-AVI-006, CERTFR-2018-AVI-008, CERTFR-2018-AVI-009, CERTFR-2018-AVI-012, CERTFR-2018-AVI-013, CERTFR-2018-AVI-014, CERTFR-2018-AVI-016, CERTFR-2018-AVI-027, CERTFR-2018-AVI-029, CERTFR-2018-AVI-032, CERTFR-2018-AVI-048, CERTFR-2018-AVI-049, CERTFR-2018-AVI-077, CERTFR-2018-AVI-079, CERTFR-2018-AVI-094, CERTFR-2018-AVI-114, CERTFR-2018-AVI-124, CERTFR-2018-AVI-134, CERTFR-2018-AVI-208, CERTFR-2018-AVI-256, CERTFR-2018-AVI-365, CERTFR-2018-AVI-584, CERTFR-2019-AVI-042, CERTFR-2019-AVI-052, CERTFR-2019-AVI-131, CERTFR-2019-AVI-242, CERTFR-2019-AVI-361, cisco-sa-20180104-cpusidechannel, cpuapr2018, cpuapr2019, CTX231390, CTX231399, CVE-2017-5753, CVE-2018-3693, DLA-1422-1, DLA-1422-2, DLA-1423-1, DLA-1424-1, DLA-1434-1, DLA-1731-1, DLA-1731-2, DSA-2018-049, DSA-4187-1, DSA-4188-1, FEDORA-2018-21a7ad920c, FEDORA-2018-276558ff6f, FEDORA-2018-6b319763ab, FEDORA-2018-7e17849364, FEDORA-2018-e6fe35524d, FEDORA-2018-fb582aabcc, FG-IR-18-002, HT208397, HT208401, ibm10742755, INTEL-OSS-10002, JSA10842, JSA10873, JSA10917, K91229003, MBGSA-1801, MFSA-2018-01, N1022433, nas8N1022433, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, openSUSE-SU-2018:0326-1, openSUSE-SU-2018:0459-1, openSUSE-SU-2018:1623-1, openSUSE-SU-2018:2119-1, RHSA-2018:0007-01, RHSA-2018:0008-01, RHSA-2018:0009-01, RHSA-2018:0010-01, RHSA-2018:0011-01, RHSA-2018:0012-01, RHSA-2018:0013-01, RHSA-2018:0014-01, RHSA-2018:0015-01, RHSA-2018:0016-01, RHSA-2018:0017-01, RHSA-2018:0018-01, RHSA-2018:0020-01, RHSA-2018:0021-01, RHSA-2018:0022-01, RHSA-2018:0023-01, RHSA-2018:0024-01, RHSA-2018:0025-01, RHSA-2018:0026-01, RHSA-2018:0027-01, RHSA-2018:0028-01, RHSA-2018:0029-01, RHSA-2018:0030-01, RHSA-2018:0031-01, RHSA-2018:0032-01, RHSA-2018:0034-01, RHSA-2018:0035-01, RHSA-2018:0036-01, RHSA-2018:0037-01, RHSA-2018:0038-01, RHSA-2018:0039-01, RHSA-2018:0040-01, RHSA-2018:0053-01, RHSA-2018:0093-01, RHSA-2018:0094-01, RHSA-2018:0103-01, RHSA-2018:0104-01, RHSA-2018:0105-01, RHSA-2018:0106-01, RHSA-2018:0107-01, RHSA-2018:0108-01, RHSA-2018:0109-01, RHSA-2018:0110-01, RHSA-2018:0111-01, RHSA-2018:0112-01, RHSA-2018:0182-01, RHSA-2018:0292-01, RHSA-2018:0464-01, RHSA-2018:0496-01, RHSA-2018:0512-01, RHSA-2018:1129-01, RHSA-2018:1196-01, RHSA-2019:1946-01, SA161, SB10226, Spectre, spectre_meltdown_advisory, SSA-168644, SSA-505225, STORM-2018-001, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0031-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0113-1, SUSE-SU-2018:0114-1, SUSE-SU-2018:0115-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0219-1, SUSE-SU-2018:0438-1, SUSE-SU-2018:0472-1, SUSE-SU-2018:0601-1, SUSE-SU-2018:0609-1, SUSE-SU-2018:0638-1, SUSE-SU-2018:0678-1, SUSE-SU-2018:0909-1, SUSE-SU-2018:1368-1, SUSE-SU-2018:1376-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:2150-1, SUSE-SU-2018:2528-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0765-1, SUSE-SU-2019:1550-1, Synology-SA-18:01, USN-3516-1, USN-3521-1, USN-3530-1, USN-3541-1, USN-3541-2, USN-3542-1, USN-3542-2, USN-3549-1, USN-3580-1, USN-3597-1, USN-3597-2, VIGILANCE-VUL-24948, VMSA-2018-0002, VMSA-2018-0004, VMSA-2018-0004.2, VMSA-2018-0004.3, VMSA-2018-0007, VN-2018-001, VN-2018-002, VU#584653, XSA-254.

Description of the vulnerability

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2018-4124

Apple iOS, macOS: memory corruption

Synthesis of the vulnerability

An attacker can generate a memory corruption of Apple iOS et macOS, in order to trigger a denial of service, and possibly to run code.
Impacted products: iOS by Apple, iPhone, Mac OS X.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, denial of service on service, denial of service on client.
Provenance: document.
Creation date: 20/02/2018.
Identifiers: CERTFR-2018-AVI-090, CVE-2018-4124, HT208534, HT208535, VIGILANCE-VUL-25329.

Description of the vulnerability

An attacker can generate a memory corruption of Apple iOS et macOS, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2017-5715

Processors: memory reading via Spectre Branch Target

Synthesis of the vulnerability

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Impacted products: SNS, iOS by Apple, Mac OS X, Blue Coat CAS, Cisco ASR, Cisco Catalyst, Nexus by Cisco, NX-OS, Cisco Router, Cisco UCS, XenServer, Debian, ConnectPort TSx, Avamar, ExtremeXOS, Summit, BIG-IP Hardware, TMOS, Fedora, FortiAnalyzer, FortiGate, FortiManager, FortiOS, FreeBSD, Android OS, Chrome, AIX, IBM i, QRadar SIEM, Juniper J-Series, Junos OS, Junos Space, NSMXpress, Linux, McAfee Email Gateway, McAfee NSM, McAfee NTBA, McAfee Web Gateway, Meinberg NTP Server, Edge, IE, SQL Server, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 2016, Windows 7, Windows 8, Windows (platform) ~ not comprehensive, Windows RT, Firefox, openSUSE Leap, Opera, Oracle Communications, WebLogic, pfSense, RealPresence Collaboration Server, RealPresence Distributed Media Application, RealPresence Resource Manager, RHEL, SIMATIC, Slackware, Sonus SBC, SUSE Linux Enterprise Desktop, SLES, Symantec Content Analysis, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive, ESXi, VMware vSphere, VMware vSphere Hypervisor, VMware Workstation, Xen.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 05/01/2018.
Revision date: 07/02/2018.
Identifiers: 2016636, 519675, ADV180002, CERTFR-2018-AVI-004, CERTFR-2018-AVI-005, CERTFR-2018-AVI-006, CERTFR-2018-AVI-008, CERTFR-2018-AVI-009, CERTFR-2018-AVI-012, CERTFR-2018-AVI-013, CERTFR-2018-AVI-014, CERTFR-2018-AVI-016, CERTFR-2018-AVI-028, CERTFR-2018-AVI-029, CERTFR-2018-AVI-030, CERTFR-2018-AVI-032, CERTFR-2018-AVI-040, CERTFR-2018-AVI-048, CERTFR-2018-AVI-049, CERTFR-2018-AVI-075, CERTFR-2018-AVI-079, CERTFR-2018-AVI-080, CERTFR-2018-AVI-083, CERTFR-2018-AVI-094, CERTFR-2018-AVI-104, CERTFR-2018-AVI-118, CERTFR-2018-AVI-119, CERTFR-2018-AVI-124, CERTFR-2018-AVI-134, CERTFR-2018-AVI-161, CERTFR-2018-AVI-170, CERTFR-2018-AVI-196, CERTFR-2018-AVI-206, CERTFR-2018-AVI-208, CERTFR-2018-AVI-256, CERTFR-2019-AVI-242, cisco-sa-20180104-cpusidechannel, cpujul2019, CTX231390, CTX231399, CVE-2017-5715, DLA-1349-1, DLA-1362-1, DLA-1369-1, DLA-1422-1, DLA-1422-2, DLA-1497-1, DLA-1506-1, DSA-2018-049, DSA-4120-1, DSA-4120-2, DSA-4179-1, DSA-4187-1, DSA-4188-1, DSA-4213-1, FEDORA-2018-21a7ad920c, FEDORA-2018-276558ff6f, FEDORA-2018-6b319763ab, FEDORA-2018-7e17849364, FEDORA-2018-e6fe35524d, FEDORA-2018-fb582aabcc, FG-IR-18-002, FreeBSD-SA-18:03.speculative_execution, HT208397, HT208401, JSA10842, JSA10873, K91229003, LSN-0035-1, MBGSA-1801, MFSA-2018-01, N1022433, nas8N1022433, openSUSE-SU-2018:0013-1, openSUSE-SU-2018:0022-1, openSUSE-SU-2018:0023-1, openSUSE-SU-2018:0026-1, openSUSE-SU-2018:0030-1, openSUSE-SU-2018:0059-1, openSUSE-SU-2018:0066-1, openSUSE-SU-2018:0187-1, openSUSE-SU-2018:0326-1, openSUSE-SU-2018:0408-1, openSUSE-SU-2018:0459-1, openSUSE-SU-2018:0710-1, openSUSE-SU-2018:0745-1, openSUSE-SU-2018:0780-1, openSUSE-SU-2018:0939-1, openSUSE-SU-2018:1502-1, openSUSE-SU-2018:1623-1, openSUSE-SU-2018:1631-1, openSUSE-SU-2018:2119-1, openSUSE-SU-2018:2237-1, openSUSE-SU-2018:2524-1, RHSA-2018:0007-01, RHSA-2018:0008-01, RHSA-2018:0009-01, RHSA-2018:0010-01, RHSA-2018:0011-01, RHSA-2018:0012-01, RHSA-2018:0013-01, RHSA-2018:0014-01, RHSA-2018:0015-01, RHSA-2018:0016-01, RHSA-2018:0017-01, RHSA-2018:0018-01, RHSA-2018:0020-01, RHSA-2018:0021-01, RHSA-2018:0022-01, RHSA-2018:0023-01, RHSA-2018:0024-01, RHSA-2018:0025-01, RHSA-2018:0026-01, RHSA-2018:0027-01, RHSA-2018:0028-01, RHSA-2018:0029-01, RHSA-2018:0030-01, RHSA-2018:0031-01, RHSA-2018:0032-01, RHSA-2018:0034-01, RHSA-2018:0035-01, RHSA-2018:0036-01, RHSA-2018:0037-01, RHSA-2018:0038-01, RHSA-2018:0039-01, RHSA-2018:0040-01, RHSA-2018:0053-01, RHSA-2018:0093-01, RHSA-2018:0094-01, RHSA-2018:0103-01, RHSA-2018:0104-01, RHSA-2018:0105-01, RHSA-2018:0106-01, RHSA-2018:0107-01, RHSA-2018:0108-01, RHSA-2018:0109-01, RHSA-2018:0110-01, RHSA-2018:0111-01, RHSA-2018:0112-01, RHSA-2018:0182-01, RHSA-2018:0292-01, RHSA-2018:0496-01, RHSA-2018:0512-01, RHSA-2018:1129-01, RHSA-2018:1196-01, SA161, SB10226, Spectre, spectre_meltdown_advisory, SSA-168644, SSA:2018-016-01, SSA:2018-037-01, STORM-2018-001, SUSE-SU-2018:0006-1, SUSE-SU-2018:0007-1, SUSE-SU-2018:0008-1, SUSE-SU-2018:0009-1, SUSE-SU-2018:0011-1, SUSE-SU-2018:0012-1, SUSE-SU-2018:0019-1, SUSE-SU-2018:0020-1, SUSE-SU-2018:0031-1, SUSE-SU-2018:0036-1, SUSE-SU-2018:0039-1, SUSE-SU-2018:0040-1, SUSE-SU-2018:0041-1, SUSE-SU-2018:0051-1, SUSE-SU-2018:0056-1, SUSE-SU-2018:0067-1, SUSE-SU-2018:0068-1, SUSE-SU-2018:0069-1, SUSE-SU-2018:0113-1, SUSE-SU-2018:0114-1, SUSE-SU-2018:0115-1, SUSE-SU-2018:0131-1, SUSE-SU-2018:0171-1, SUSE-SU-2018:0219-1, SUSE-SU-2018:0383-1, SUSE-SU-2018:0416-1, SUSE-SU-2018:0437-1, SUSE-SU-2018:0438-1, SUSE-SU-2018:0472-1, SUSE-SU-2018:0525-1, SUSE-SU-2018:0555-1, SUSE-SU-2018:0601-1, SUSE-SU-2018:0609-1, SUSE-SU-2018:0638-1, SUSE-SU-2018:0660-1, SUSE-SU-2018:0678-1, SUSE-SU-2018:0705-1, SUSE-SU-2018:0708-1, SUSE-SU-2018:0762-1, SUSE-SU-2018:0831-1, SUSE-SU-2018:0838-1, SUSE-SU-2018:0841-1, SUSE-SU-2018:0861-1, SUSE-SU-2018:0909-1, SUSE-SU-2018:0920-1, SUSE-SU-2018:0986-1, SUSE-SU-2018:1077-1, SUSE-SU-2018:1080-1, SUSE-SU-2018:1308-1, SUSE-SU-2018:1363-1, SUSE-SU-2018:1368-1, SUSE-SU-2018:1376-1, SUSE-SU-2018:1386-1, SUSE-SU-2018:1498-1, SUSE-SU-2018:1503-1, SUSE-SU-2018:1567-1, SUSE-SU-2018:1570-1, SUSE-SU-2018:1571-1, SUSE-SU-2018:1603-1, SUSE-SU-2018:1658-1, SUSE-SU-2018:1661-1, SUSE-SU-2018:1699-1, SUSE-SU-2018:1759-1, SUSE-SU-2018:1784-1, SUSE-SU-2018:2082-1, SUSE-SU-2018:2141-1, SUSE-SU-2018:2189-1, SUSE-SU-2018:2528-1, SUSE-SU-2018:2631-1, SUSE-SU-2019:13999-1, Synology-SA-18:01, USN-3516-1, USN-3530-1, USN-3531-1, USN-3531-2, USN-3531-3, USN-3541-1, USN-3541-2, USN-3549-1, USN-3560-1, USN-3561-1, USN-3580-1, USN-3581-1, USN-3581-2, USN-3581-3, USN-3582-1, USN-3582-2, USN-3594-1, USN-3597-1, USN-3597-2, USN-3620-1, USN-3620-2, USN-3690-1, USN-3690-2, VIGILANCE-VUL-24949, VMSA-2018-0002, VMSA-2018-0004, VMSA-2018-0004.2, VMSA-2018-0004.3, VN-2018-001, VN-2018-002, VU#584653, XSA-254.

Description of the vulnerability

A local attacker can monitor the performances of its process, in order to get information about the data used for computing by the processor.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2017-13889 CVE-2018-4082 CVE-2018-4083

Apple macOS: multiple vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Apple macOS.
Impacted products: Mac OS X.
Severity: 3/4.
Consequences: administrator access/rights, privileged access/rights, client access/rights, data reading, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 21.
Creation date: 24/01/2018.
Identifiers: 1419, 1421, 1430, 1477, CERTFR-2018-AVI-053, CVE-2017-13889, CVE-2018-4082, CVE-2018-4083, CVE-2018-4084, CVE-2018-4085, CVE-2018-4086, CVE-2018-4088, CVE-2018-4089, CVE-2018-4090, CVE-2018-4091, CVE-2018-4092, CVE-2018-4093, CVE-2018-4094, CVE-2018-4096, CVE-2018-4097, CVE-2018-4098, CVE-2018-4100, CVE-2018-4147, CVE-2018-4169, CVE-2018-4189, CVE-2018-4298, HT208465, VIGILANCE-VUL-25140, ZDI-18-237.

Description of the vulnerability

An attacker can use several vulnerabilities of Apple macOS.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Apple macOS Sierra: