ID

VAR-201609-0236


CVE

CVE-2016-4736


TITLE

Apple OS X of libarchive Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-004975

DESCRIPTION

libarchive in Apple OS X before 10.12 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted file. Apple Mac OS X is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code, gain sensitive information, cause denial-of-service conditions, bypass security restrictions, and perform unauthorized actions. This may aid in other attacks. These issues are fixed in: Apple macOS 10.12. libarchive is one of the multi-format archive and compression library components. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13 macOS High Sierra 10.13 addresses the following: 802.1X Available for: OS X Mountain Lion 10.8 and later Impact: An attacker may be able to exploit weaknesses in TLS 1.0 Description: A protocol security issue was addressed by enabling TLS 1.1 and TLS 1.2. CVE-2017-13832: an anonymous researcher Entry added October 31, 2017 apache Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in Apache Description: Multiple issues were addressed by updating to version 2.4.27. CVE-2017-3167 CVE-2017-3169 CVE-2017-7659 CVE-2017-7668 CVE-2017-7679 CVE-2017-9788 CVE-2017-9789 Entry added October 31, 2017 apache Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in Apache Description: Multiple issues existed in Apache. These were addressed by updating Apache to version 2.4.25. CVE-2016-736 CVE-2016-2161 CVE-2016-5387 CVE-2016-8740 CVE-2016-8743 Entry added October 31, 2017 AppleScript Available for: OS X Mountain Lion 10.8 and later Impact: Decompiling an AppleScript with osadecompile may lead to arbitrary code execution Description: A validation issue was addressed with improved input sanitization. CVE-2017-13809: an anonymous researcher Entry added October 31, 2017 Application Firewall Available for: OS X Lion v10.8 and later Impact: A previously denied application firewall setting may take effect after upgrading Description: An upgrade issue existed in the handling of firewall settings. This issue was addressed through improved handling of firewall settings during upgrades. CVE-2017-7074: Daniel Jalkut of Red Sweater Software ATS Available for: OS X Mountain Lion 10.8 and later Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: A memory corruption issue was addressed with improved input validation. CVE-2017-13820: John Villamil, Doyensec Entry added October 31, 2017 Audio Available for: OS X Mountain Lion 10.8 and later Impact: Parsing a maliciously crafted QuickTime file may lead to an unexpected application termination or arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-13807: Yangkang (@dnpushme) of Qihoo 360 Qex Team Entry added October 31, 2017 Captive Network Assistant Available for: OS X Lion v10.8 and later Impact: A local user may unknowingly send a password unencrypted over the network Description: The security state of the captive portal browser was not obvious. This issue was addressed with improved visibility of the captive portal browser security state. CVE-2017-7083: Abhinav Bansal of Zscaler Inc. CFString Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13821: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017 CoreAudio Available for: OS X Lion v10.8 and later Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed by updating to Opus version 1.1.4. CVE-2017-0381: V.E.O (@VYSEa) of Mobile Threat Research Team, Trend Micro CoreText Available for: OS X Mountain Lion 10.8 and later Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-13825: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017 Directory Utility Available for: OS X Lion v10.8 and later Impact: A local attacker may be able to determine the Apple ID of the owner of the computer Description: A permissions issue existed in the handling of the Apple ID. This issue was addressed with improved access controls. CVE-2017-7138: an anonymous researcher file Available for: OS X Lion v10.8 and later Impact: Multiple issues in file Description: Multiple issues were addressed by updating to version 5.30. CVE-2017-7121: found by OSS-Fuzz CVE-2017-7122: found by OSS-Fuzz CVE-2017-7123: found by OSS-Fuzz CVE-2017-7124: found by OSS-Fuzz CVE-2017-7125: found by OSS-Fuzz CVE-2017-7126: found by OSS-Fuzz file Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in file Description: Multiple issues were addressed by updating to version 5.31. CVE-2017-13815 Entry added October 31, 2017 Fonts Available for: OS X Mountain Lion 10.8 and later Impact: Rendering untrusted text may lead to spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2017-13828: an anonymous researcher Entry added October 31, 2017 fsck_msdos Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13811: an anonymous researcher Entry added October 31, 2017 HelpViewer Available for: OS X Mountain Lion 10.8 and later Impact: A quarantined HTML file may execute arbitrary JavaScript cross-origin Description: A cross-site scripting issue existed in HelpViewer. This issue was addressed by removing the affected file. CVE-2017-13819: an anonymous researcher Entry added October 31, 2017 HFS Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13830: Sergej Schumilo of Ruhr-University Bochum Entry added October 31, 2017 ImageIO Available for: OS X Mountain Lion 10.8 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-13814: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017 ImageIO Available for: OS X Mountain Lion 10.8 and later Impact: Processing a maliciously crafted image may lead to a denial of service Description: An information disclosure issue existed in the processing of disk images. This issue was addressed through improved memory management. CVE-2017-13831: an anonymous researcher Entry added October 31, 2017 Installer Available for: OS X Mountain Lion 10.8 and later Impact: A malicious application may be able to access the FileVault unlock key Description: This issue was addressed by removing additional entitlements. CVE-2017-13837: Patrick Wardle of Synack Entry added October 31, 2017 IOFireWireFamily Available for: OS X Lion v10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-7077: Brandon Azad IOFireWireFamily Available for: OS X Lion v10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-7119: Xiaolong Bai, Min (Spark) Zheng of Alibaba Inc., Benjamin Gnahm (@mitp0sh) of PDX Kernel Available for: OS X Lion v10.8 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-7114: Alex Plaskett of MWR InfoSecurity Kernel Available for: OS X Mountain Lion 10.8 and later Impact: A local user may be able to leak sensitive user information Description: A permissions issue existed in kernel packet counters. This issue was addressed through improved permission validation. CVE-2017-13810: an anonymous researcher Entry added October 31, 2017 Kernel Available for: OS X Mountain Lion 10.8 and later Impact: A local user may be able to read kernel memory Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-2017-13817: Maxime Villard (m00nbsd) Entry added October 31, 2017 Kernel Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13818: The UK's National Cyber Security Centre (NCSC) CVE-2017-13836: an anonymous researcher, an anonymous researcher CVE-2017-13841: an anonymous researcher CVE-2017-13840: an anonymous researcher CVE-2017-13842: an anonymous researcher CVE-2017-13782: Kevin Backhouse of Semmle Ltd. Entry added October 31, 2017 Kernel Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13843: an anonymous researcher Entry added October 31, 2017 Kernel Available for: OS X Mountain Lion 10.8 and later Impact: Processing a malformed mach binary may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved validation. CVE-2017-13834: Maxime Villard (m00nbsd) Entry added October 31, 2017 kext tools Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A logic error in kext loading was addressed with improved state handling. CVE-2017-13827: an anonymous researcher Entry added October 31, 2017 libarchive Available for: OS X Mountain Lion 10.8 and later Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-13813: found by OSS-Fuzz CVE-2017-13816: found by OSS-Fuzz Entry added October 31, 2017 libarchive Available for: OS X Mountain Lion 10.8 and later Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: Multiple memory corruption issues existed in libarchive. These issues were addressed through improved input validation. CVE-2017-13812: found by OSS-Fuzz Entry added October 31, 2017 libarchive Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2016-4736: Proteas of Qihoo 360 Nirvan Team Entry added October 31, 2017 libc Available for: OS X Lion v10.8 and later Impact: A remote attacker may be able to cause a denial-of-service Description: A resource exhaustion issue in glob() was addressed through an improved algorithm. CVE-2017-1000373 libexpat Available for: OS X Lion v10.8 and later Impact: Multiple issues in expat Description: Multiple issues were addressed by updating to version 2.2.1 CVE-2016-9063 CVE-2017-9233 Mail Available for: OS X Lion v10.8 and later Impact: The sender of an email may be able to determine the IP address of the recipient Description: Turning off "Load remote content in messages" did not apply to all mailboxes. This issue was addressed with improved setting propagation. CVE-2017-7141: an anonymous researcher Mail Drafts Available for: OS X Lion v10.8 and later Impact: An attacker with a privileged network position may be able to intercept mail contents Description: An encryption issue existed in the handling of mail drafts. This issue was addressed with improved handling of mail drafts meant to be sent encrypted. CVE-2017-7078: an anonymous researcher, an anonymous researcher, an anonymous researcher ntp Available for: OS X Lion v10.8 and later Impact: Multiple issues in ntp Description: Multiple issues were addressed by updating to version 4.2.8p10 CVE-2017-6451: Cure53 CVE-2017-6452: Cure53 CVE-2017-6455: Cure53 CVE-2017-6458: Cure53 CVE-2017-6459: Cure53 CVE-2017-6460: Cure53 CVE-2017-6462: Cure53 CVE-2017-6463: Cure53 CVE-2017-6464: Cure53 CVE-2016-9042: Matthew Van Gundy of Cisco Open Scripting Architecture Available for: OS X Mountain Lion 10.8 and later Impact: Decompiling an AppleScript with osadecompile may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13824: an anonymous researcher Entry added October 31, 2017 PCRE Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in pcre Description: Multiple issues were addressed by updating to version 8.40. CVE-2017-13846 Entry added October 31, 2017 Postfix Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in Postfix Description: Multiple issues were addressed by updating to version 3.2.2. CVE-2017-13826: an anonymous researcher Entry added October 31, 2017 Quick Look Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13822: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017 Quick Look Available for: OS X Mountain Lion 10.8 and later Impact: Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-7132: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017 QuickTime Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13823: an anonymous researcher Entry added October 31, 2017 Remote Management Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13808: an anonymous researcher Entry added October 31, 2017 Sandbox Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13838: an anonymous researcher Entry added October 31, 2017 Screen Lock Available for: OS X Lion v10.8 and later Impact: Application Firewall prompts may appear over Login Window Description: A window management issue was addressed through improved state management. CVE-2017-7082: Tim Kingman Security Available for: OS X Lion v10.8 and later Impact: A revoked certificate may be trusted Description: A certificate validation issue existed in the handling of revocation data. This issue was addressed through improved validation. CVE-2017-7080: Sven Driemecker of adesso mobile solutions gmbh, Rune Darrud (@theflyingcorpse) of BA|rum kommune, an anonymous researcher, an anonymous researcher Spotlight Available for: OS X Mountain Lion 10.8 and later Impact: Spotlight may display results for files not belonging to the user Description: An access issue existed in Spotlight. This issue was addressed through improved access restrictions. CVE-2017-13839: an anonymous researcher Entry added October 31, 2017 SQLite Available for: OS X Lion v10.8 and later Impact: Multiple issues in SQLite Description: Multiple issues were addressed by updating to version 3.19.3. CVE-2017-7127: an anonymous researcher WebKit Available for: OS X Lion v10.8 and later Impact: A malicious website may be able to track users in Safari private browsing mode Description: A permissions issue existed in the handling of web browser cookies. This issue was addressed with improved restrictions. CVE-2017-7144: an anonymous researcher zlib Available for: OS X Lion v10.8 and later Impact: Multiple issues in zlib Description: Multiple issues were addressed by updating to version 1.2.11. CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2016-9843 Installation note: macOS High Sierra 10.13 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAln4u8MpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEaV7BAA oPmo5pAA/HORVC3jl7tvStUpsUUiiez204FhuoVFsvHq0w7eYjsYDilzw7f6yveV e9Xhlbz7jhFpa1SXQhtiK5SSA1aJqhXIzZPSSf4ex/6qBZCSUrAZi1vC05TuQFi2 bvZ9N2mr3Mwd4GlxN7XZ6DLi3BqQPaKIavmuxOLkUSCpkwj9npS1oPDvMCP8DX4q goywFq4QOgvSJnohH/G8IGSm2Txy/IES68vvxdPRUi3IzjGM7E88QHkwKBDiqZRG ozuhx8Zs+cEh8yIzLO2UoTJe5gVgz1si7J4tgCPTT65r3Uf2sizkOMMdX8PHmCCi WTs3adVyJgC8nNql24cvPpJ4UM7bia0adzNf7cjTf7KKtVomIzR6IFaa+V737a+A jESOB5J0iy1oqzfGN8/zf724N+rc5jp/QejM6tTvcNuc807Z4jVpR3CEr+GkMENz Hq1Vr06gnBolmwnwlhCHujYwOpJXJ2xllQavNoe6r57XTYid1rjuRG5KXNWPlEgw GyoB8rTLY+BzLszUtrQlhh5QXa8WaQLg0uPJJDHH3DUM7jEXRBrk7nhrz4z2qq7S j1hlkhZbW2HuYg9URLhgYtkMgVjbTneZkWhEqER+AIbqFKdwTkuNgu5sHnWCrXG0 N+hmcqhXbgblWwiT0ma/I7Yn0b7O9g9stN88cL9cr3I= =887+ -----END PGP SIGNATURE----- . This issue was addressed by limiting the time the FileVault decryption buffers are DMA mapped to the duration of the I/O operation. CVE-2017-13804: @qwertyoruiopz at KJC Research Intl. S.R.L

Trust: 2.25

sources: NVD: CVE-2016-4736 // JVNDB: JVNDB-2016-004975 // BID: 93055 // VULHUB: VHN-93555 // VULMON: CVE-2016-4736 // PACKETSTORM: 144862 // PACKETSTORM: 144827

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.11.6

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.11.6

Trust: 1.0

vendor:applemodel:mac osscope:eqversion:x10.11.6

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.12

Trust: 0.3

sources: BID: 93055 // JVNDB: JVNDB-2016-004975 // CNNVD: CNNVD-201609-447 // NVD: CVE-2016-4736

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-4736
value: HIGH

Trust: 1.0

NVD: CVE-2016-4736
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201609-447
value: CRITICAL

Trust: 0.6

VULHUB: VHN-93555
value: HIGH

Trust: 0.1

VULMON: CVE-2016-4736
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-4736
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-93555
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-4736
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-93555 // VULMON: CVE-2016-4736 // JVNDB: JVNDB-2016-004975 // CNNVD: CNNVD-201609-447 // NVD: CVE-2016-4736

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-93555 // JVNDB: JVNDB-2016-004975 // NVD: CVE-2016-4736

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201609-447

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201609-447

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004975

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-09-20 macOS Sierra 10.12url:http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html

Trust: 0.8

title:HT207170url:https://support.apple.com/en-us/HT207170

Trust: 0.8

title:HT207170url:https://support.apple.com/ja-jp/HT207170

Trust: 0.8

title:Apple OS X libarchive Repair measures for memory corruption vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64323

Trust: 0.6

title:Apple: macOS Sierra 10.12url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=56fe8957a503c1b7b6f00fbd6d759042

Trust: 0.1

title:Apple: macOS High Sierra 10.13url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=dc5ef303c64758e2c6d76a32028764e1

Trust: 0.1

title:Apple: macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, and Security Update 2017-004 El Capitanurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=870f3f04ef17f7b183f74ae687a1561d

Trust: 0.1

sources: VULMON: CVE-2016-4736 // JVNDB: JVNDB-2016-004975 // CNNVD: CNNVD-201609-447

EXTERNAL IDS

db:NVDid:CVE-2016-4736

Trust: 3.1

db:BIDid:93055

Trust: 2.1

db:SECTRACKid:1036858

Trust: 1.2

db:JVNid:JVNVU90950877

Trust: 0.8

db:JVNDBid:JVNDB-2016-004975

Trust: 0.8

db:CNNVDid:CNNVD-201609-447

Trust: 0.7

db:ZDIid:ZDI-16-608

Trust: 0.3

db:ZDIid:ZDI-16-609

Trust: 0.3

db:VULHUBid:VHN-93555

Trust: 0.1

db:VULMONid:CVE-2016-4736

Trust: 0.1

db:PACKETSTORMid:144862

Trust: 0.1

db:PACKETSTORMid:144827

Trust: 0.1

sources: VULHUB: VHN-93555 // VULMON: CVE-2016-4736 // BID: 93055 // JVNDB: JVNDB-2016-004975 // PACKETSTORM: 144862 // PACKETSTORM: 144827 // CNNVD: CNNVD-201609-447 // NVD: CVE-2016-4736

REFERENCES

url:http://www.securityfocus.com/bid/93055

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2016/sep/msg00006.html

Trust: 1.8

url:https://support.apple.com/ht207170

Trust: 1.8

url:https://support.apple.com/ht208221

Trust: 1.2

url:http://www.securitytracker.com/id/1036858

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4736

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90950877/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4736

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://prod.lists.apple.com/archives/security-announce/2016/sep/msg00006.html

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-608/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-16-609/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2016-5387

Trust: 0.2

url:https://support.apple.com/kb/ht201222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-8743

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-4736

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-2161

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2016-8740

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://www.apple.com/support/downloads/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/apple-osx-appleefiruntime-cve-2016-4696

Trust: 0.1

url:https://support.apple.com/kb/ht207170

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13782

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13810

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13809

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-10989

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13817

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-0381

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9842

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000373

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13814

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9042

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9840

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13813

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9063

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9841

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9843

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13812

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12896

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11543

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12895

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12893

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12897

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11542

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12986

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11108

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000100

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1298

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-11103

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12894

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12985

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12899

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12900

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12902

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000101

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-12987

Trust: 0.1

sources: VULHUB: VHN-93555 // VULMON: CVE-2016-4736 // BID: 93055 // JVNDB: JVNDB-2016-004975 // PACKETSTORM: 144862 // PACKETSTORM: 144827 // CNNVD: CNNVD-201609-447 // NVD: CVE-2016-4736

CREDITS

Qidan He(@flanker_hqd) from KeenLab working with Trend Micro's Zero Day Initiative, Shrek_wzw of Qihoo 360 Nirvan Team, Jack Tang (@jacktang310) and Moony Li of Trend Micro working with Trend Micro's Zero Day Initiative, Meder Kydyraliev Google Security T

Trust: 0.6

sources: CNNVD: CNNVD-201609-447

SOURCES

db:VULHUBid:VHN-93555
db:VULMONid:CVE-2016-4736
db:BIDid:93055
db:JVNDBid:JVNDB-2016-004975
db:PACKETSTORMid:144862
db:PACKETSTORMid:144827
db:CNNVDid:CNNVD-201609-447
db:NVDid:CVE-2016-4736

LAST UPDATE DATE

2025-04-13T20:11:41.448000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-93555date:2017-11-14T00:00:00
db:VULMONid:CVE-2016-4736date:2017-11-14T00:00:00
db:BIDid:93055date:2016-11-24T01:11:00
db:JVNDBid:JVNDB-2016-004975date:2016-09-30T00:00:00
db:CNNVDid:CNNVD-201609-447date:2016-09-26T00:00:00
db:NVDid:CVE-2016-4736date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-93555date:2016-09-25T00:00:00
db:VULMONid:CVE-2016-4736date:2016-09-25T00:00:00
db:BIDid:93055date:2016-09-20T00:00:00
db:JVNDBid:JVNDB-2016-004975date:2016-09-30T00:00:00
db:PACKETSTORMid:144862date:2017-11-02T23:36:12
db:PACKETSTORMid:144827date:2017-11-01T15:41:26
db:CNNVDid:CNNVD-201609-447date:2016-09-26T00:00:00
db:NVDid:CVE-2016-4736date:2016-09-25T10:59:39.783