ID

VAR-201603-0224


CVE

CVE-2016-1764


TITLE

Apple OS X Vulnerability in Important Information Acquisition in Content Security Policy Implementation of Message

Trust: 0.8

sources: JVNDB: JVNDB-2016-001893

DESCRIPTION

The Content Security Policy (CSP) implementation in Messages in Apple OS X before 10.11.4 allows remote attackers to obtain sensitive information via a javascript: URL. Apple Mac OS X is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks. Apple Mac OS X 10.11 through 10.11.3 are vulnerable. Messages is one of the application components for sending texts, photos and videos. Attackers can exploit this vulnerability through JavaScript links to leak sensitive user information

Trust: 2.07

sources: NVD: CVE-2016-1764 // JVNDB: JVNDB-2016-001893 // BID: 85056 // VULHUB: VHN-90583 // VULMON: CVE-2016-1764

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.11.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.11 to 10.11.3

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.11.3

Trust: 0.6

sources: JVNDB: JVNDB-2016-001893 // CNNVD: CNNVD-201603-347 // NVD: CVE-2016-1764

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1764
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-1764
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201603-347
value: MEDIUM

Trust: 0.6

VULHUB: VHN-90583
value: MEDIUM

Trust: 0.1

VULMON: CVE-2016-1764
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-1764
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-90583
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1764
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-90583 // VULMON: CVE-2016-1764 // JVNDB: JVNDB-2016-001893 // CNNVD: CNNVD-201603-347 // NVD: CVE-2016-1764

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-90583 // JVNDB: JVNDB-2016-001893 // NVD: CVE-2016-1764

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201603-347

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201603-347

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-001893

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-03-21-5 OS X El Capitan 10.11.4 and Security Update 2016-002url:http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html

Trust: 0.8

title:HT206167url:https://support.apple.com/en-us/HT206167

Trust: 0.8

title:HT206167url:https://support.apple.com/ja-jp/HT206167

Trust: 0.8

title:Apple OS X Messages Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=60673

Trust: 0.6

title:Apple: OS X El Capitan v10.11.4 and Security Update 2016-002url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=ef054ba76412200e34091eb91c38c281

Trust: 0.1

title:cve-2016-1764url:https://github.com/moloch--/cve-2016-1764

Trust: 0.1

title:CVE-PoC-collectionurl:https://github.com/Dark-Vex/CVE-PoC-collection

Trust: 0.1

sources: VULMON: CVE-2016-1764 // JVNDB: JVNDB-2016-001893 // CNNVD: CNNVD-201603-347

EXTERNAL IDS

db:NVDid:CVE-2016-1764

Trust: 2.9

db:SECTRACKid:1035363

Trust: 1.2

db:JVNid:JVNVU97668313

Trust: 0.8

db:JVNDBid:JVNDB-2016-001893

Trust: 0.8

db:CNNVDid:CNNVD-201603-347

Trust: 0.7

db:SECUNIAid:63459

Trust: 0.6

db:BIDid:85056

Trust: 0.4

db:ZDIid:ZDI-16-206

Trust: 0.3

db:ZDIid:ZDI-16-205

Trust: 0.3

db:ZDIid:ZDI-16-202

Trust: 0.3

db:VULHUBid:VHN-90583

Trust: 0.1

db:VULMONid:CVE-2016-1764

Trust: 0.1

sources: VULHUB: VHN-90583 // VULMON: CVE-2016-1764 // BID: 85056 // JVNDB: JVNDB-2016-001893 // CNNVD: CNNVD-201603-347 // NVD: CVE-2016-1764

REFERENCES

url:http://lists.apple.com/archives/security-announce/2016/mar/msg00004.html

Trust: 1.8

url:https://support.apple.com/ht206167

Trust: 1.8

url:http://www.securitytracker.com/id/1035363

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1764

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97668313/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1764

Trust: 0.8

url:http://secunia.com/advisories/63459

Trust: 0.6

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-202

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-205

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-206

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/moloch--/cve-2016-1764

Trust: 0.1

url:https://www.securityfocus.com/bid/85056

Trust: 0.1

url:https://support.apple.com/kb/ht206167

Trust: 0.1

sources: VULHUB: VHN-90583 // VULMON: CVE-2016-1764 // BID: 85056 // JVNDB: JVNDB-2016-001893 // CNNVD: CNNVD-201603-347 // NVD: CVE-2016-1764

CREDITS

Proteas of Qihoo 360 Nirvan Team, Andrea Barisani and Andrej Rosano of Inverse Path, beist and ABH of BoB, Jeonghoon Shin@A.D.D, HappilyCoded, Ian Beer of Google Project Zero, sweetchip of Grayhash, Piotr Bania of Cisco Talos, Peter Pi, Juwei Lin , Matthe

Trust: 0.3

sources: BID: 85056

SOURCES

db:VULHUBid:VHN-90583
db:VULMONid:CVE-2016-1764
db:BIDid:85056
db:JVNDBid:JVNDB-2016-001893
db:CNNVDid:CNNVD-201603-347
db:NVDid:CVE-2016-1764

LAST UPDATE DATE

2025-04-13T20:11:41.874000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-90583date:2016-12-03T00:00:00
db:VULMONid:CVE-2016-1764date:2016-12-03T00:00:00
db:BIDid:85056date:2016-07-05T21:57:00
db:JVNDBid:JVNDB-2016-001893date:2016-03-28T00:00:00
db:CNNVDid:CNNVD-201603-347date:2016-03-24T00:00:00
db:NVDid:CVE-2016-1764date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-90583date:2016-03-24T00:00:00
db:VULMONid:CVE-2016-1764date:2016-03-24T00:00:00
db:BIDid:85056date:2016-03-21T00:00:00
db:JVNDBid:JVNDB-2016-001893date:2016-03-28T00:00:00
db:CNNVDid:CNNVD-201603-347date:2016-03-23T00:00:00
db:NVDid:CVE-2016-1764date:2016-03-24T01:59:32.750