Vulnerability Name:

CVE-2016-4669 (CCN-118486)

Assigned:2016-10-24
Published:2016-10-24
Updated:2020-08-14
Summary:An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Kernel" component. It allows local users to execute arbitrary code in a privileged context or cause a denial of service (MIG code mishandling and system crash) via unspecified vectors.
CVSS v3 Severity:7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
7.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:F/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2016-4669

Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/158874/Safari-Webkit-For-iOS-7.1.2-JIT-Optimization-Bug.html

Source: BID
Type: Third Party Advisory, VDB Entry
93849

Source: CCN
Type: BID-93849
Apple macOS/watchOS/iOS/tvOS Multiple Security Vulnerabilities

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1037086

Source: XF
Type: UNKNOWN
appleios-cve20164669-code-exec(118486)

Source: CCN
Type: Packet Storm Security [10-29-2016]
Mac OS X / iOS mach_ports_register Memory Safety Issues

Source: CCN
Type: Packet Storm Security [08-14-2020]
Safari Webkit For iOS 7.1.2 JIT Optimization Bug

Source: CCN
Type: Apple security document HT207269
About the security content of watchOS 3.1

Source: CCN
Type: Apple security document HT207270
About the security content of tvOS 10.0.1

Source: CCN
Type: Apple Web site
About the security content of iOS 10.1

Source: CCN
Type: Apple security document HT207275
About the security content of macOS Sierra 10.12.1, Security Update 2016-002 El Capitan, and Security Update 2016-006 Yosemite

Source: CONFIRM
Type: Vendor Advisory
https://support.apple.com/HT207269

Source: CONFIRM
Type: Vendor Advisory
https://support.apple.com/HT207270

Source: CONFIRM
Type: Vendor Advisory
https://support.apple.com/HT207271

Source: CONFIRM
Type: Vendor Advisory
https://support.apple.com/HT207275

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [10-31-2016]

Source: EXPLOIT-DB
Type: Exploit, Third Party Advisory, VDB Entry
40654

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:iphone_os:*:*:*:*:*:*:*:* (Version < 10.1)

  • Configuration 2:
  • cpe:/o:apple:mac_os_x:*:*:*:*:*:*:*:* (Version < 10.12.1)

  • Configuration 3:
  • cpe:/o:apple:tvos:*:*:*:*:*:*:*:* (Version < 10.0.1)

  • Configuration 4:
  • cpe:/o:apple:watchos:*:*:*:*:*:*:*:* (Version < 3.1)

  • Configuration CCN 1:
  • cpe:/o:apple:ios:10.0.0:*:*:*:*:*:*:*
  • AND
  • cpe:/o:apple:mac_os_x:10.10.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.11.6:*:*:*:*:*:*:*
  • OR cpe:/o:apple:macos_sierra:10.12:*:*:*:*:*:*:*
  • OR cpe:/o:apple:watchos:3.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple iphone os *
    apple mac os x *
    apple tvos *
    apple watchos *
    apple ios 10.0.0
    apple mac os x 10.10.5
    apple mac os x 10.11.6
    apple macos sierra 10.12
    apple watchos 3.0