CVE-2016-1817
Apple OS X IOAcceleratorFamily2 Buffer Overflow Privilege Escalation Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
IOAcceleratorFamily in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1818 and CVE-2016-1819.
IOAcceleratorFamily en Apple iOS en versiones anteriores a 9.3.2, OS X en versiones anteriores a 10.11.5, tvOS en versiones anteriores a 9.2.1 y watchOS en versiones anteriores a 2.2.1 permite a atacantes ejecutar código arbitrario en un contexto privilegiado o causar una denegación de servicio (corrupción de memoria) a través de una app manipulada, una vulnerabilidad diferente a CVE-2016-1818 y CVE-2016-1819.
This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of the IOAcceleratorFamily2 interface. The issue lies in the failure to ensure that a user-supplied size is within the bounds of the allocated buffer. An attacker can leverage this to escalate their privileges and execute code under the context of the kernel.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-01-13 CVE Reserved
- 2016-05-17 CVE Published
- 2024-08-05 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/90694 | Third Party Advisory | |
http://www.securitytracker.com/id/1035890 | Third Party Advisory | |
http://www.zerodayinitiative.com/advisories/ZDI-16-340 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html | 2019-03-25 | |
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html | 2019-03-25 | |
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html | 2019-03-25 | |
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html | 2019-03-25 | |
https://support.apple.com/HT206564 | 2019-03-25 | |
https://support.apple.com/HT206566 | 2019-03-25 | |
https://support.apple.com/HT206567 | 2019-03-25 | |
https://support.apple.com/HT206568 | 2019-03-25 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apple Search vendor "Apple" | Tvos Search vendor "Apple" for product "Tvos" | < 9.2.1 Search vendor "Apple" for product "Tvos" and version " < 9.2.1" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Iphone Os Search vendor "Apple" for product "Iphone Os" | < 9.3.2 Search vendor "Apple" for product "Iphone Os" and version " < 9.3.2" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | < 10.11.5 Search vendor "Apple" for product "Mac Os X" and version " < 10.11.5" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Watchos Search vendor "Apple" for product "Watchos" | < 2.2.1 Search vendor "Apple" for product "Watchos" and version " < 2.2.1" | - |
Affected
|