← Voltar para CVEs
CVE-2016-1823
N/ADescricao
The IOHIDDevice::handleReportWithTime function in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (out-of-bounds read and memory corruption) via a crafted IOHIDReportType enum, which triggers an incorrect cast, a different vulnerability than CVE-2016-1824.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado5/20/2016
Ultima modificacao4/12/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
apple:iphone_osapple:mac_os_xapple:tvosapple:watchos
Fraquezas (CWE)
CWE-125
Referencias
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html(product-security@apple.com)
http://packetstormsecurity.com/files/137397/OS-X-Kernel-Raw-Cast-Out-Of-Bounds-Read.html(product-security@apple.com)
http://www.securityfocus.com/bid/90698(product-security@apple.com)
http://www.securitytracker.com/id/1035890(product-security@apple.com)
https://bugs.chromium.org/p/project-zero/issues/detail?id=774(product-security@apple.com)
https://support.apple.com/HT206564(product-security@apple.com)
https://support.apple.com/HT206566(product-security@apple.com)
https://support.apple.com/HT206567(product-security@apple.com)
https://support.apple.com/HT206568(product-security@apple.com)
https://www.exploit-db.com/exploits/39927/(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/137397/OS-X-Kernel-Raw-Cast-Out-Of-Bounds-Read.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/90698(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1035890(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/project-zero/issues/detail?id=774(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206564(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206566(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206567(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206568(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39927/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.