A vulnerability in Cisco AMP for Endpoints Mac Connector Software installed on Apple macOS 10.12 could allow an unauthenticated, remote attacker to cause a kernel panic on an affected system, resulting in a denial of service (DoS) condition. The vulnerability exists if the affected software is running in Block network conviction mode. Exploitation could occur if the system that is running the affected software starts a server process and an address in the IP blacklist cache of the affected software attempts to connect to the affected system. A successful exploit could allow the attacker to cause a kernel panic on the system that is running the affected software, resulting in a DoS condition. Cisco Bug IDs: CSCvk08192.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104946 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180801-fampmac | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2018-08-01T20:00:00
Updated: 2018-08-03T09:57:01
Reserved: 2017-11-27T00:00:00
Link: CVE-2018-0397
JSON object: View
NVD Information
Status : Modified
Published: 2018-08-01T20:29:00.310
Modified: 2019-10-09T23:31:58.427
Link: CVE-2018-0397
JSON object: View
Redhat Information
No data.