Vulnerability Name: | CVE-2016-7612 (CCN-120170) | ||||||||||||
Assigned: | 2016-12-22 | ||||||||||||
Published: | 2016-12-22 | ||||||||||||
Updated: | 2018-10-30 | ||||||||||||
Summary: | An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-7612 Source: BID Type: Third Party Advisory, VDB Entry 94905 Source: CCN Type: BID-94905 Apple macOS/watchOS/iOS/tvOS Multiple Security Vulnerabilities Source: SECTRACK Type: UNKNOWN 1037469 Source: CCN Type: Google Security Research Issue 926 ipc_port_t reference count leak with nested MIG methods leads to OS X/iOS kernel UaF Source: XF Type: UNKNOWN apple-macosx-cve20167612-code-exec(120170) Source: CCN Type: Packet Storm Security [12-22-2016] Mac OS X / iOS ipc_port_t Reference Count Leak / Use-After-Free Source: CCN Type: Apple Web site About the security content of iOS 10.2 Source: CCN Type: Apple Web site About the security content of macOS Sierra 10.12.2, Security Update 2016-003 El Capitan, and Security Update 2016-007 Yosemite Source: CCN Type: Apple security document HT207425 About the security content of tvOS 10.1 Source: CCN Type: Apple security document HT207487 About the security content of watchOS 3.1.3 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207422 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207423 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207487 Source: EXPLOIT-DB Type: UNKNOWN 40955 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||||||
BACK |