SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Multimedia)  >   Apple TV Vendors:   Apple
(Apple Issues Fix for Apple TV) Apple iOS Multiple Bugs Let Remote Users Execute Arbitrary Code and Deny Service and Let Local Users Bypass Security Restrictions
SecurityTracker Alert ID:  1037430
SecurityTracker URL:  http://securitytracker.com/id/1037430
CVE Reference:   CVE-2016-7626   (Links to External Site)
Date:  Dec 13 2016
Impact:   Denial of service via network, Disclosure of authentication information, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can cause denial of service conditions on the target system. A local user can obtain passwords on the target system. A local user can bypass security restrictions. A remote user can bypass security controls on the target system. Apple TV is affected.

A remote user can create a specially crafted certificate that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target user's system [CVE-2016-7626].

A physically local user can overhear spoken passwords [CVE-2016-7634].

A physically local user can bypass the lock screen to access photos and contact [CVE-2016-7664].

Authorization settings may fail to be reset when an app is uninstalled [CVE-2016-7651].

A physically local user on an unlocked device can disable the 'Find My iPhone' feature [CVE-2016-7638].

A remote user can create a specially crafted video that, when loaded by the target user, will trigger a flaw in the Graphics Driver and cause denial of service conditions [CVE-2016-7665].

A physically local user with a specially crafted USB HID device can trigger a validation flaw and execute arbitrary code on the target system [CVE-2016-4690:

When the Touch ID prompt is displayed, the idle timer may malfunction and the lock screen may fail to invoke after the idle timeout [CVE-2016-7601].

A remote user can trigger a certificate validation flaw in the Mail S/MIME policy implementation and fail to notify if the remote user's email was signed with a revoked certificate [CVE-2016-4689].

A physically local user can bypass the lockscreen and view photos and contacts [CVE-2016-7653].

A physically local user can exploit a flaw in the counting of passcode attempts when resetting the passcode to unlock the target device [CVE-2016-4781].

A physically local user can exploit a flaw in Handoff with Siri to keep the device unlocked [CVE-2016-7597].

An anonymous researcher, Davut Hari, Maksymilian Arciemowicz (cxsecurity.com), Andy Davis of NCC Group, Miguel Alvarado of iDeviceHelp, Moataz El Gaml of Schlumberger, Ju Zhu and Lilang Wu of Trend Micro, and Sezer Sakiner reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can cause denial of service conditions.

A local user can obtain passwords on the target system.

A remote or local user can bypass security controls on the target system.

Solution:   Apple has issued a fix for CVE-2016-7626 for Apple TV (10.1).

The Apple advisory is available at:

https://support.apple.com/kb/HT207425

Vendor URL:  support.apple.com/kb/HT207425 (Links to External Site)
Cause:   Access control error, Authentication error, Input validation error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Dec 13 2016 Apple iOS Multiple Bugs Let Remote Users Execute Arbitrary Code and Deny Service and Let Local Users Bypass Security Restrictions



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC