| Vulnerability Name: | CVE-2016-7626 (CCN-120560) | ||||||||||||
| Assigned: | 2016-12-13 | ||||||||||||
| Published: | 2016-12-13 | ||||||||||||
| Updated: | 2019-03-13 | ||||||||||||
| Summary: | An issue was discovered in certain Apple products. iOS before 10.2 is affected. tvOS before 10.1 is affected. watchOS before 3.1.1 is affected. The issue involves the "Profiles" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted certificate profile. | ||||||||||||
| CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2016-7626 Source: BID Type: Third Party Advisory, VDB Entry 94852 Source: CCN Type: BID-94852 Apple iOS/WatchOS/tvOS CVE-2016-7626 Memory Corruption Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1037429 Source: XF Type: UNKNOWN apple-tvos-cve20167626-code-exec(120560) Source: CONFIRM Type: Mailing List, Vendor Advisory https://lists.apple.com/archives/security-announce/2016/Dec/msg00001.html Source: CCN Type: Packet Storm Security [12-12-2016] iOS 10.1.x Certificate File Memory Corruption Source: CCN Type: Apple security document HT207422 About the security content of iOS 10.2 Source: CCN Type: Apple security document HT207425 About the security content of tvOS 10.1 Source: CCN Type: Apple security document HT207487 About the security content of watchOS 3.1.3 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207422 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207425 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207487 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [12-12-2016] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 40906 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||