A vulnerability in Cisco AMP for Endpoints Mac Connector Software installed on Apple macOS 10.12 could allow an unauthenticated, remote attacker to cause a kernel panic on an affected system, resulting in a denial of service (DoS) condition. The vulnerability exists if the affected software is running in Block network conviction mode. Exploitation could occur if the system that is running the affected software starts a server process and an address in the IP blacklist cache of the affected software attempts to connect to the affected system. A successful exploit could allow the attacker to cause a kernel panic on the system that is running the affected software, resulting in a DoS condition. Cisco Bug IDs: CSCvk08192.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104946 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-fampmac | Patch Vendor Advisory |
http://www.securityfocus.com/bid/104946 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-fampmac | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/104946 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-fampmac - Patch, Vendor Advisory |
Information
Published : 2018-08-01 20:29
Updated : 2024-11-21 03:38
NVD link : CVE-2018-0397
Mitre link : CVE-2018-0397
CVE.ORG link : CVE-2018-0397
JSON object : View
Products Affected
cisco
- advanced_malware_protection_for_endpoints
apple
- mac_os_x
CWE