← Zuruck zu CVEs
CVE-2016-1719
N/ABeschreibung
The IOHIDFamily API in Apple iOS before 9.2.1, OS X before 10.11.3, and tvOS before 9.1.1 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht2/1/2016
Zuletzt geandert4/12/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apple:iphone_osapple:mac_os_xapple:tvosapple:watchos
Schwachen (CWE)
CWE-119
Referenzen
http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html(product-security@apple.com)
http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html(product-security@apple.com)
http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html(product-security@apple.com)
http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html(product-security@apple.com)
http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html(product-security@apple.com)
http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html(product-security@apple.com)
http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html(product-security@apple.com)
http://www.securitytracker.com/id/1034736(product-security@apple.com)
https://code.google.com/p/google-security-research/issues/detail?id=603(product-security@apple.com)
https://code.google.com/p/google-security-research/issues/detail?id=604(product-security@apple.com)
https://code.google.com/p/google-security-research/issues/detail?id=605(product-security@apple.com)
https://code.google.com/p/google-security-research/issues/detail?id=606(product-security@apple.com)
https://code.google.com/p/google-security-research/issues/detail?id=607(product-security@apple.com)
https://code.google.com/p/google-security-research/issues/detail?id=608(product-security@apple.com)
https://support.apple.com/HT205729(product-security@apple.com)
https://support.apple.com/HT205731(product-security@apple.com)
https://support.apple.com/HT205732(product-security@apple.com)
https://support.apple.com/HT206168(product-security@apple.com)
https://www.exploit-db.com/exploits/39359/(product-security@apple.com)
https://www.exploit-db.com/exploits/39360/(product-security@apple.com)
https://www.exploit-db.com/exploits/39361/(product-security@apple.com)
https://www.exploit-db.com/exploits/39362/(product-security@apple.com)
https://www.exploit-db.com/exploits/39363/(product-security@apple.com)
https://www.exploit-db.com/exploits/39364/(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jan/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/Jan/msg00005.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/135438/iOS-Kernel-IOReportHub-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/135439/iOS-Kernel-IOHIDEventService-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/135440/iOS-Kernel-AppleOscarCMA-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/135441/iOS-Kernel-AppleOscarCompass-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/135442/iOS-Kernel-AppleOscarAccelerometer-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/135443/iOS-Kernel-AppleOscarGyro-Use-After-Free.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1034736(af854a3a-2127-422b-91ae-364da2661108)
https://code.google.com/p/google-security-research/issues/detail?id=603(af854a3a-2127-422b-91ae-364da2661108)
https://code.google.com/p/google-security-research/issues/detail?id=604(af854a3a-2127-422b-91ae-364da2661108)
https://code.google.com/p/google-security-research/issues/detail?id=605(af854a3a-2127-422b-91ae-364da2661108)
https://code.google.com/p/google-security-research/issues/detail?id=606(af854a3a-2127-422b-91ae-364da2661108)
https://code.google.com/p/google-security-research/issues/detail?id=607(af854a3a-2127-422b-91ae-364da2661108)
https://code.google.com/p/google-security-research/issues/detail?id=608(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT205729(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT205731(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT205732(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206168(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39359/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39360/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39361/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39362/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39363/(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39364/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.