SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   Apple macOS/OS X Vendors:   Apple
Apple macOS/OS X Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information, Modify Files, and Execute Arbitrary Code and Let Local Users Deny Service and Obtain Elevated Privileges
SecurityTracker Alert ID:  1037086
SecurityTracker URL:  http://securitytracker.com/id/1037086
CVE Reference:   CVE-2016-4635, CVE-2016-4660, CVE-2016-4661, CVE-2016-4662, CVE-2016-4663, CVE-2016-4667, CVE-2016-4669, CVE-2016-4671, CVE-2016-4673, CVE-2016-4674, CVE-2016-4675, CVE-2016-4678, CVE-2016-4679, CVE-2016-4682, CVE-2016-7579   (Links to External Site)
Date:  Oct 25 2016
Impact:   Denial of service via local system, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, Root access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 10.12.1
Description:   Multiple vulnerabilities were reported in Apple macOS/OS X. A remote user can cause arbitrary code to be executed on the target user's system. A local user can cause denial of service conditions on the target system. A remote user can modify files on the target system. A local user can obtain root privileges on the target system. A remote user can obtain potentially sensitive information on the target system.

An application can trigger a memory corruption error in AppleGraphicsControl to execute arbitrary code with kernel-level privileges [CVE-2016-4662].

A local user can trigger null pointer dereference in AppleSMC to gain elevated privileges on the target system [CVE-2016-4678].

A remote user can create a specially crafted font file that, when loaded by the target user, will trigger a memory corruption error in ATS and execute arbitrary code on the target user's system [CVE-2016-4667].

A local user can trigger a memory corruption error in ATS and execute arbitrary code with elevated privileges [CVE-2016-4674].

A remote user in a privileged network position can cause proxy password authentication prompts to be issued to potentially obtain proxy credentials [CVE-2016-7579].


A remote user can create a specially crafted JPEG file that, when loaded by the target user, will trigger a memory corruption error in CoreGraphics and execute arbitrary code on the target user's system [CVE-2016-4673].

A remote user in a privileged network position can cause a relayed FaceTime call to continue to transmit audio but appear as if the call has been terminated [CVE-2016-4635].

A remote user can create a specially crafted font file that, when loaded by the target user, will trigger an out-of-bounds memory read error in FontParser and obtain potentially sensitive user information [CVE-2016-4660].

A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger an out-of-bounds memory write error in ImageIO and execute arbitrary code on the target user's system [CVE-2016-4671].

A remote user can create a specially crafted SGI image that, when loaded by the target user, will trigger an out-of-bounds memory read error and obtain process memory [CVE-2016-4682].

A remote user can create a specially crafted archive that, when loaded by the target user, will trigger a symlink path validation flaw in libarchive and overwrite arbitrary files on the target system [CVE-2016-4679].

An application can trigger a flaw in libxpc to execute arbitrary code with root privileges [CVE-2016-4675].

An application can trigger a validation flaw in the parsing of disk images to cause denial of service conditions on the target system [CVE-2016-4661].

An application can trigger a memory corruption error in NVIDIA Graphics Drivers and cause denial of service conditions on the target system [CVE-2016-4663].

A local user can trigger an input validation flaw in MIG generated code in the kernel and cause the target system to crash or execute arbitrary code with kernel-level privileges [CVE-2016-4669].

Jerry Decime, Shrek_wzw of Qihoo 360 Nirvan Team, Simmon Huang of alipay, Thelongestusernameofall@gmail.com Moony Li of Trend Micro, @Flyic, Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent, Martin Vigo (@martin_vigo) of salesforce.com, Ke Liu of Tencent's Xuanwu Lab, Juwei Lin (@fuzzerDOTcn),
Omer Medan of enSilo Ltd, Recurity Labs on behalf of BSI (German Federal Office for Information Security), daybreaker@Minionz (via Trend Micro's Zero Day Initiative), and Ian Beer of Google Project Zero reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A local user can cause denial of service conditions on the target system.

A remote user can modify files on the target system.

A local user can obtain root privileges on the target system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix (10.12.1).

The vendor advisory is available at:

https://support.apple.com/en-us/HT207275

Vendor URL:  support.apple.com/en-us/HT207275 (Links to External Site)
Cause:   Access control error, Input validation error, State error

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 25 2016 (Apple Issues Fix for Apple iOS) Apple macOS/OS X Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information, Modify Files, and Execute Arbitrary Code and Let Local Users Deny Service and Obtain Elevated Privileges
Apple has issued a fix for Apple iOS.
Oct 25 2016 (Apple Issues Fix for Apple TV) Apple macOS/OS X Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information, Modify Files, and Execute Arbitrary Code and Let Local Users Deny Service and Obtain Elevated Privileges
Apple has issued a fix for Apple TV.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC