Weakness Mac OS

  1. One caveat is the weakness in the 'game release' - directx has never gotten supported (for game porters to make use of) - however Unity game engine DOES support Apple OS. But really - cross platform is bull (anything worth it needs non-free drivers); most apps today would be better done with XCode than to attempt cpt's.
  2. MacOS Vulnerabilities No operating system is invulnerable and while the Mac is more secure than most, it’s not perfect.

The twelfth major release of Apple's flagship desktop and server operating system dropped on September 30th, 2015, bringing with it a host of new and improved features like Split View, a smarter Spotlight, Metal for Core Graphics, and under-the-hood performance improvements, among others. Alas, benefits do not without a price—in this case, myriad of security issues and exploitablevulnerabilities. The following are the top 10 of the lot followed by remediation tips.

1. Accelerate Framework Vulnerability

The Accelerate Framework consists of C APIs for vector and matrix math, digital signal processing, large number handling, and image processing. In multi-threading mode, security flaws could lead to arbitrary code execution or memory corruption and denial-of-service (DoS) when visiting a maliciously crafted website.

Weakness Mac Os X

Weakness

Appleis aloof approach, technical shyness, and reluctance to support long-term research with customers is one of its biggest weaknesses.

Weakness Osteopenia

2. Kernal Virtual Memory Vulnerability

Apple's virtual memory kicks in when real memory (RAM) runs low, tapping into free hard disk space as a temporary memory source. A kernal issue in OS X El Capitan involving the mishandling of memory reuse could allow attackers to cause a DoS via a local, crafted application.

3. Core Audio Vulnerability

The Core Audio framework consists of a set of software interfaces for audio features in applications for OS X. Unfortunately, coreaudiod—the BSD process for this service—does not initialize an unspecified data structure, which could ultimately allow an attacker to execute arbitrary malicious code via a specially crafted application.

4. apache_mod_php Vulnerabilities

The Apache web server and PHP comes preinstalled with OS X El Capitan. Multiple vulnerabilities in apache_mod_php could allow remote attackers to execute arbitrary code by either exploiting the faulty php_date_timezone_initialize_from_hash function or the __nss_hostname_digits_dots function in glibc 2.2.

5. CFNetwork Vulnerability

CFNetwork is a framework in Core Services that provides a library of abstractions for network protocols. The flaw in question involves its inability to distinguish uppercase versus lowercase during cookie parsing, which could allow remote web servers to overwrite cookies via unspecified vectors.

6. Core Graphics Vulnerabilities

Core Graphics—also known as Quartz—is a set of graphics-related APIs for OS X that forms the basis of 2-D graphics rendering. In OS X El Capitan, multiple flaws in the Core Graphics component could allow remote attackers to execute arbitrary code or cause a DoS (memory corruption) via a specially crafted web site.

7. Core Text Vulnerabilities

CVE-2015-6992,CVE-2015-6975,CVE-2015-5944

Core Text is OS X's text engine/programming interface that enables fine-grained control over text layout, formatting, and font-related operations. Multiple vulnerabilities in the latter could allow remote attackers to execute arbitrary code or cause a DoS (memory corruption) with a specially crafted font file.

8. Grand Central Dispatch Vulnerability

Grand Central Dispatch (GCD) optimizes application support for systems with multi-core processors and other symmetric multiprocessing systems. A flaw in GCD could allow attackers to execute arbitrary code or cause a DoS (memory corruption) with a specially crafted package mishandled during dispatch calls.

9. MCX Application Restriction Vulnerability

MCX—or Managed Clients for OS X—allows a network administrator or operator to define important preference settings on a master management server and propagate said settings automatically to new machines connecting to the network. This particular vulnerability could allow attackers to execute arbitrary code or cause a DoS (memory corruption) with a specially crafted package that is mishandled during dispatch calls.

10. Security Agent Vulnerability

Security Agent is a process that provides the user interface for the Security Server in OS X, used primarily for requesting authentication when an application requests additional privileges. A malicious application could exploit a flaw in Security Agent to programmatically control keychain access prompts.

Remediation

Upgrading to OS X El Capitan 10.11.1 can effectively remediate these vulnerabilities; that said, such security flaws in infrastructures with large, disparate OS X environments can be difficult to address. UpGuard's comprehensive vulnerability scanner can automatically scan and identify the aforementioned vulnerabilities and more through policy-driven testing. Try it out today—it's free for up to 10 nodes.

Sources