[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

Security bypass vulnerability in EFI component in Apple Mac OS X during the EFI update process

ID: oval:org.secpod.oval:def:30901Date: (C)2015-11-06   (M)2024-02-19
Class: VULNERABILITYFamily: macos




The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to properly handle an Apple Ethernet Thunderbolt adapter with crafted code in an Option ROM. Successful exploitation could allow physically proximate attackers to modify firmware during the EFI update process.

Platform:
Apple Mac OS X 10.10
Apple Mac OS X 10.6
Apple Mac OS X 10.7
Apple Mac OS X 10.8
Apple Mac OS X 10.9
Apple Mac OS X Server 10.10
Apple Mac OS X Server 10.6
Apple Mac OS X Server 10.7
Apple Mac OS X Server 10.8
Apple Mac OS X Server 10.9
Reference:
CVE-2015-5914
CVE    1
CVE-2015-5914
CPE    3
cpe:/o:apple:mac_os_x
cpe:/o:apple:mac_os_x:10.10.5
cpe:/o:apple:mac_os_x_server

© SecPod Technologies