CVE-2016-4669
Published on: 02/20/2017 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:26:59 PM UTC
Certain versions of Iphone Os from Apple contain the following vulnerability:
An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. watchOS before 3.1 is affected. The issue involves the "Kernel" component. It allows local users to execute arbitrary code in a privileged context or cause a denial of service (MIG code mishandling and system crash) via unspecified vectors.
- CVE-2016-4669 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 7.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
|
---|---|---|---|---|
LOCAL | LOW | LOW | NONE | |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
|
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 7.2 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
LOCAL | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Apple macOS/OS X Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information, Modify Files, and Execute Arbitrary Code and Let Local Users Deny Service and Obtain Elevated Privileges - SecurityTracker | Third Party Advisory VDB Entry www.securitytracker.com text/html |
![]() |
Safari Webkit For iOS 7.1.2 JIT Optimization Bug ≈ Packet Storm | packetstormsecurity.com text/html |
![]() |
About the security content of watchOS 3.1 - Apple Support | Vendor Advisory support.apple.com text/html |
![]() |
Apple macOS/watchOS/iOS/tvOS Multiple Security Vulnerabilities | Third Party Advisory VDB Entry cve.report (archive) text/html |
![]() |
About the security content of macOS Sierra 10.12.1, Security Update 2016-002 El Capitan, and Security Update 2016-006 Yosemite - Apple Support | Vendor Advisory support.apple.com text/html |
![]() |
About the security content of iOS 10.1 - Apple Support | Vendor Advisory support.apple.com text/html |
![]() |
Apple OS X/iOS - 'mach_ports_register' Multiple Memory Safety s - Multiple dos Exploit | Exploit Third Party Advisory VDB Entry www.exploit-db.com Proof of Concept text/html |
![]() |
About the security content of tvOS 10.0.1 - Apple Support | Vendor Advisory support.apple.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Exploit/POC from Github
不完美的利用代码,只能用于学习:)
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Apple | Iphone Os | All | All | All | All |
Operating System | Apple | Iphone Os | All | All | All | All |
Operating System | Apple | Mac Os X | All | All | All | All |
Operating System | Apple | Mac Os X | All | All | All | All |
Operating System | Apple | Tvos | All | All | All | All |
Operating System | Apple | Tvos | All | All | All | All |
Operating System | Apple | Watchos | All | All | All | All |
Operating System | Apple | Watchos | All | All | All | All |
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*:
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE