ID

VAR-201510-0190


CVE

CVE-2015-7033


TITLE

plural Apple Vulnerabilities in products that allow arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2015-005348

DESCRIPTION

The Apple iWork application before 2.6 for iOS, Apple Keynote before 6.6, Apple Pages before 5.6, and Apple Numbers before 3.6 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted document. Multiple Apple Products are prone to a remote memory-corruption vulnerability. A remote attacker can leverage this issue to execute arbitrary code in the context of the user running the application. Failed exploit attempts may result in a denial-of-service condition. in the United States. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-10-15-1 Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 are now available which address the following: Keynote, Pages, and Numbers Available for: OS X Yosemite v10.10.4 or later, iOS 8.4 or later Impact: Opening a maliciously crafted document may lead to compromise of user information Description: Multiple input validation issues existed in parsing a maliciously crafted document. These issues were addressed through improved input validation. CVE-ID CVE-2015-3784 : Bruno Morisson of INTEGRITY S.A. This issue was addressed through improved memory handling. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7034 : Felix Groebert of the Google Security Team Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 may be obtained from the App Store. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJWIChpAAoJEBcWfLTuOo7tm6wP/A7VLym8s1mxvtZtkL6rlP9G LDuDKD6Q+ukd4EU41unLvgJC3DrC5XmJKBySrReX7hLBbHMElCFOa971+GVZl4aE 9gbX3zJvNf9uIzP3VSpmYw1tIdZVXr275ypdG+Nlc1YBCpcdMD6ohD9dJD1zdG8l ieuEvRFFUFGdgtIk5PO6YKHstYFkcQbbmt/uy61y3CglIDWyPOeJ7m6DWlCPYB3I PtY82ust1XPpJT0WSH3sfLyhluoq89VFPmiZhwDnOUopWuLmNoLntoQFnbCnRNwd 5nGzjukKGe8eQQ5guZP8wo+t57Rz37povvDWOXxvuk2mjjr0+ejQpRk+c7/4aIkX Uyz4nW4DGCEjXDA8/yT5HXWHb7m28WehV5fnUiNVkl0PltwLY5nlSk29sD2BMiT6 DY3KUXT6ppZxqVMm3HEzM3VQKD5kfiFJkzXx1QtOzx4mAyTUKqN98Ni7ijf/O7CI xjyNOCBNcMRtqA0ySUncvMiCeRo1b7Y2hthqY6GtmRjKbq2D8ooZyiEHGv6E10g1 Hn46jPJWPKcOMudszPUc2/AIaj94+Xb7Esq3wUSkz5e7c068oxUFBZLjVDeH8P8i /3AUN6OXLVoGCkQvdv0kvsmQDsTJqq3iUkBSDSzE5RD8GDYh+cyi+54ZFV7BKhCi ikrC4CqPxEcf3lk6bXKi =Zci4 -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2015-7033 // JVNDB: JVNDB-2015-005348 // BID: 77105 // VULHUB: VHN-84994 // PACKETSTORM: 133995

AFFECTED PRODUCTS

vendor:applemodel:iworkscope:lteversion:2.5.4

Trust: 1.0

vendor:applemodel:keynotescope:lteversion:6.5

Trust: 1.0

vendor:applemodel:pagesscope:lteversion:5.5.3

Trust: 1.0

vendor:applemodel:numbersscope:lteversion:3.5

Trust: 1.0

vendor:applemodel:numbersscope:eqversion:3.5

Trust: 0.9

vendor:applemodel:keynotescope:eqversion:6.5

Trust: 0.9

vendor:applemodel:iworkscope:ltversion:for ios 2.6 (ios 8.4 or later )

Trust: 0.8

vendor:applemodel:keynotescope:ltversion:6.6 (ios 8.4 or later )

Trust: 0.8

vendor:applemodel:keynotescope:ltversion:6.6 (os x yosemite v10.10.4 or later )

Trust: 0.8

vendor:applemodel:numbersscope:ltversion:3.6 (ios 8.4 or later )

Trust: 0.8

vendor:applemodel:numbersscope:ltversion:3.6 (os x yosemite v10.10.4 or later )

Trust: 0.8

vendor:applemodel:pagesscope:ltversion:5.6 (ios 8.4 or later )

Trust: 0.8

vendor:applemodel:pagesscope:ltversion:5.6 (os x yosemite v10.10.4 or later )

Trust: 0.8

vendor:applemodel:iworkscope:eqversion:2.5.4

Trust: 0.6

vendor:applemodel:pagesscope:eqversion:5.5.3

Trust: 0.6

vendor:applemodel:pagesscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.4

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:6.0

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.2

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0

Trust: 0.3

vendor:applemodel:iwork for iosscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4

Trust: 0.3

vendor:applemodel:pagesscope:neversion:5.6

Trust: 0.3

vendor:applemodel:numbersscope:neversion:3.6

Trust: 0.3

vendor:applemodel:keynotescope:neversion:6.6

Trust: 0.3

vendor:applemodel:iwork for iosscope:neversion:2.6

Trust: 0.3

sources: BID: 77105 // JVNDB: JVNDB-2015-005348 // CNNVD: CNNVD-201510-328 // NVD: CVE-2015-7033

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-7033
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-7033
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201510-328
value: MEDIUM

Trust: 0.6

VULHUB: VHN-84994
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-7033
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-84994
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-84994 // JVNDB: JVNDB-2015-005348 // CNNVD: CNNVD-201510-328 // NVD: CVE-2015-7033

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-84994 // JVNDB: JVNDB-2015-005348 // NVD: CVE-2015-7033

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201510-328

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201510-328

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-005348

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2015-10-15-1 Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6url:http://lists.apple.com/archives/security-announce/2015/Oct/msg00000.html

Trust: 0.8

title:HT205373url:https://support.apple.com/en-us/HT205373

Trust: 0.8

title:HT205373url:http://support.apple.com/ja-jp/HT205373

Trust: 0.8

sources: JVNDB: JVNDB-2015-005348

EXTERNAL IDS

db:NVDid:CVE-2015-7033

Trust: 2.9

db:SECTRACKid:1033826

Trust: 1.1

db:SECTRACKid:1033825

Trust: 1.1

db:SECTRACKid:1033823

Trust: 1.1

db:JVNid:JVNVU92655282

Trust: 0.8

db:JVNDBid:JVNDB-2015-005348

Trust: 0.8

db:CNNVDid:CNNVD-201510-328

Trust: 0.7

db:BIDid:77105

Trust: 0.4

db:VULHUBid:VHN-84994

Trust: 0.1

db:PACKETSTORMid:133995

Trust: 0.1

sources: VULHUB: VHN-84994 // BID: 77105 // JVNDB: JVNDB-2015-005348 // PACKETSTORM: 133995 // CNNVD: CNNVD-201510-328 // NVD: CVE-2015-7033

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/oct/msg00000.html

Trust: 1.7

url:https://support.apple.com/ht205373

Trust: 1.7

url:http://www.securitytracker.com/id/1033823

Trust: 1.1

url:http://www.securitytracker.com/id/1033825

Trust: 1.1

url:http://www.securitytracker.com/id/1033826

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7033

Trust: 0.8

url:http://jvn.jp/vu/jvnvu92655282/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7033

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:https://support.apple.com/en-in/ht205373

Trust: 0.3

url:http://gpgtools.org

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7034

Trust: 0.1

url:http://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3784

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7032

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-7033

Trust: 0.1

sources: VULHUB: VHN-84994 // BID: 77105 // JVNDB: JVNDB-2015-005348 // PACKETSTORM: 133995 // CNNVD: CNNVD-201510-328 // NVD: CVE-2015-7033

CREDITS

Felix Groebert of the Google Security Team.

Trust: 0.3

sources: BID: 77105

SOURCES

db:VULHUBid:VHN-84994
db:BIDid:77105
db:JVNDBid:JVNDB-2015-005348
db:PACKETSTORMid:133995
db:CNNVDid:CNNVD-201510-328
db:NVDid:CVE-2015-7033

LAST UPDATE DATE

2025-04-13T23:00:02.093000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-84994date:2016-12-08T00:00:00
db:BIDid:77105date:2015-10-15T00:00:00
db:JVNDBid:JVNDB-2015-005348date:2015-10-26T00:00:00
db:CNNVDid:CNNVD-201510-328date:2015-10-23T00:00:00
db:NVDid:CVE-2015-7033date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-84994date:2015-10-18T00:00:00
db:BIDid:77105date:2015-10-15T00:00:00
db:JVNDBid:JVNDB-2015-005348date:2015-10-20T00:00:00
db:PACKETSTORMid:133995date:2015-10-16T01:45:00
db:CNNVDid:CNNVD-201510-328date:2015-10-19T00:00:00
db:NVDid:CVE-2015-7033date:2015-10-18T19:59:05.183