ID

VAR-201607-0359


CVE

CVE-2016-4621


TITLE

Apple OS X of libc++abi Vulnerable to arbitrary code execution in a privileged context

Trust: 0.8

sources: JVNDB: JVNDB-2016-004024

DESCRIPTION

libc++abi in Apple OS X before 10.11.6 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Apple Mac OS X is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks. Apple Mac OS X 10.9.5, 10.10.5 and 10.11 through 10.11.5 are vulnerable. libc++abi is one of the components used to support the C++ standard library

Trust: 1.98

sources: NVD: CVE-2016-4621 // JVNDB: JVNDB-2016-004024 // BID: 91824 // VULHUB: VHN-93440

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.11.5

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.11 and later

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.11.5

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.11.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.11

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.11.6

Trust: 0.3

vendor:applemodel:mac os security updatescope:neversion:x2016

Trust: 0.3

sources: BID: 91824 // JVNDB: JVNDB-2016-004024 // CNNVD: CNNVD-201607-877 // NVD: CVE-2016-4621

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-4621
value: HIGH

Trust: 1.0

NVD: CVE-2016-4621
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201607-877
value: CRITICAL

Trust: 0.6

VULHUB: VHN-93440
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-4621
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-93440
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-4621
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-93440 // JVNDB: JVNDB-2016-004024 // CNNVD: CNNVD-201607-877 // NVD: CVE-2016-4621

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-93440 // JVNDB: JVNDB-2016-004024 // NVD: CVE-2016-4621

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201607-877

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201607-877

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004024

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-07-18-1 OS X El Capitan v10.11.6 and Security Update 2016-004url:http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html

Trust: 0.8

title:HT206903url:https://support.apple.com/en-us/HT206903

Trust: 0.8

title:HT206903url:https://support.apple.com/ja-jp/HT206903

Trust: 0.8

title:Apple OS X libc++abi Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63237

Trust: 0.6

sources: JVNDB: JVNDB-2016-004024 // CNNVD: CNNVD-201607-877

EXTERNAL IDS

db:NVDid:CVE-2016-4621

Trust: 2.8

db:BIDid:91824

Trust: 1.4

db:SECTRACKid:1036348

Trust: 1.1

db:JVNid:JVNVU94844193

Trust: 0.8

db:JVNDBid:JVNDB-2016-004024

Trust: 0.8

db:CNNVDid:CNNVD-201607-877

Trust: 0.7

db:ZDIid:ZDI-16-496

Trust: 0.3

db:ZDIid:ZDI-16-437

Trust: 0.3

db:ZDIid:ZDI-16-431

Trust: 0.3

db:ZDIid:ZDI-16-435

Trust: 0.3

db:VULHUBid:VHN-93440

Trust: 0.1

sources: VULHUB: VHN-93440 // BID: 91824 // JVNDB: JVNDB-2016-004024 // CNNVD: CNNVD-201607-877 // NVD: CVE-2016-4621

REFERENCES

url:http://lists.apple.com/archives/security-announce/2016/jul/msg00000.html

Trust: 1.1

url:http://www.securityfocus.com/bid/91824

Trust: 1.1

url:https://support.apple.com/ht206903

Trust: 1.1

url:http://www.securitytracker.com/id/1036348

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4621

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94844193/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4621

Trust: 0.8

url:http://lists.apple.com/archives/security-announce/2016/jul/msg00001.html

Trust: 0.6

url:https://support.apple.com/ht206902

Trust: 0.6

url:http://lists.apple.com/archives/security-announce/2016/jul/msg00003.html

Trust: 0.6

url:http://lists.apple.com/archives/security-announce/2016/jul/msg00004.html

Trust: 0.6

url:https://support.apple.com/ht206900

Trust: 0.6

url:https://support.apple.com/ht206905

Trust: 0.6

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-431/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-435/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-437/

Trust: 0.3

url:apple os x acmp4aacbasedecoder out-of-bounds read information disclosure vulnerability

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-496/

Trust: 0.3

sources: VULHUB: VHN-93440 // BID: 91824 // JVNDB: JVNDB-2016-004024 // CNNVD: CNNVD-201607-877 // NVD: CVE-2016-4621

CREDITS

Jonathan Lewis from DeARX Services (PTY) LTD, Ke Liu of Tencent's Xuanwu Lab, Ian Beer of Google Project Zero, Tyler Bohan of Cisco Talos, Stefan Esser of SektionEins, Yubin Fu of Tencent KeenLab working with TrendMicro's Zero Day Initiative, Abhinav Bansa

Trust: 0.3

sources: BID: 91824

SOURCES

db:VULHUBid:VHN-93440
db:BIDid:91824
db:JVNDBid:JVNDB-2016-004024
db:CNNVDid:CNNVD-201607-877
db:NVDid:CVE-2016-4621

LAST UPDATE DATE

2025-04-13T19:51:26.672000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-93440date:2017-09-01T00:00:00
db:BIDid:91824date:2016-08-29T19:00:00
db:JVNDBid:JVNDB-2016-004024date:2016-07-28T00:00:00
db:CNNVDid:CNNVD-201607-877date:2016-07-26T00:00:00
db:NVDid:CVE-2016-4621date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-93440date:2016-07-22T00:00:00
db:BIDid:91824date:2016-07-18T00:00:00
db:JVNDBid:JVNDB-2016-004024date:2016-07-28T00:00:00
db:CNNVDid:CNNVD-201607-877date:2016-07-26T00:00:00
db:NVDid:CVE-2016-4621date:2016-07-22T02:59:40.993