ID

VAR-201702-0219


CVE

CVE-2016-7620


TITLE

Apple macOS of IOSurface Vulnerability in component critical kernel memory layout information retrieval

Trust: 0.8

sources: JVNDB: JVNDB-2016-007396

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "IOSurface" component. It allows local users to obtain sensitive kernel memory-layout information via unspecified vectors. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within IOSurface. The process does not properly validate user-supplied data which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges under the context of the kernel. Apple macOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code, perform unauthorized actions, obtain sensitive information, gain elevated privileges or cause a denial-of-service condition. IOSurface is one of the programming framework components

Trust: 2.61

sources: NVD: CVE-2016-7620 // JVNDB: JVNDB-2016-007396 // ZDI: ZDI-16-686 // BID: 94903 // VULHUB: VHN-96440

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.12.1

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.12.1

Trust: 1.0

vendor:applemodel:macosscope: - version: -

Trust: 0.7

vendor:applemodel:macosscope:eqversion:10.12.1

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.12.2

Trust: 0.3

sources: ZDI: ZDI-16-686 // BID: 94903 // JVNDB: JVNDB-2016-007396 // CNNVD: CNNVD-201612-500 // NVD: CVE-2016-7620

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-7620
value: LOW

Trust: 1.0

NVD: CVE-2016-7620
value: LOW

Trust: 0.8

ZDI: CVE-2016-7620
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-201612-500
value: LOW

Trust: 0.6

VULHUB: VHN-96440
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2016-7620
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2016-7620
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-96440
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-7620
baseSeverity: LOW
baseScore: 3.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 1.4
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-16-686 // VULHUB: VHN-96440 // JVNDB: JVNDB-2016-007396 // CNNVD: CNNVD-201612-500 // NVD: CVE-2016-7620

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-96440 // JVNDB: JVNDB-2016-007396 // NVD: CVE-2016-7620

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201612-500

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201612-500

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007396

PATCH

title:HT207423url:https://support.apple.com/en-us/HT207423

Trust: 1.5

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-12-13-1 macOS 10.12.2url:https://lists.apple.com/archives/security-announce/2016/Dec/msg00003.html

Trust: 0.8

title:HT207423url:https://support.apple.com/ja-jp/HT207423

Trust: 0.8

title:Apple macOS Sierra IOSurface Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66534

Trust: 0.6

sources: ZDI: ZDI-16-686 // JVNDB: JVNDB-2016-007396 // CNNVD: CNNVD-201612-500

EXTERNAL IDS

db:NVDid:CVE-2016-7620

Trust: 3.5

db:BIDid:94903

Trust: 2.0

db:SECTRACKid:1037469

Trust: 1.1

db:JVNid:JVNVU97133642

Trust: 0.8

db:JVNDBid:JVNDB-2016-007396

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3855

Trust: 0.7

db:ZDIid:ZDI-16-686

Trust: 0.7

db:CNNVDid:CNNVD-201612-500

Trust: 0.7

db:VULHUBid:VHN-96440

Trust: 0.1

sources: ZDI: ZDI-16-686 // VULHUB: VHN-96440 // BID: 94903 // JVNDB: JVNDB-2016-007396 // CNNVD: CNNVD-201612-500 // NVD: CVE-2016-7620

REFERENCES

url:http://www.securityfocus.com/bid/94903

Trust: 1.7

url:https://support.apple.com/ht207423

Trust: 1.7

url:http://www.securitytracker.com/id/1037469

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7620

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97133642/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-7620

Trust: 0.8

url:https://support.apple.com/en-us/ht207423

Trust: 0.7

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

sources: ZDI: ZDI-16-686 // VULHUB: VHN-96440 // BID: 94903 // JVNDB: JVNDB-2016-007396 // CNNVD: CNNVD-201612-500 // NVD: CVE-2016-7620

CREDITS

Qidan He(@flanker_hqd) from KeenLab

Trust: 0.7

sources: ZDI: ZDI-16-686

SOURCES

db:ZDIid:ZDI-16-686
db:VULHUBid:VHN-96440
db:BIDid:94903
db:JVNDBid:JVNDB-2016-007396
db:CNNVDid:CNNVD-201612-500
db:NVDid:CVE-2016-7620

LAST UPDATE DATE

2025-04-20T21:18:21.736000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-16-686date:2017-06-21T00:00:00
db:VULHUBid:VHN-96440date:2017-07-27T00:00:00
db:BIDid:94903date:2016-12-20T00:09:00
db:JVNDBid:JVNDB-2016-007396date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201612-500date:2017-02-28T00:00:00
db:NVDid:CVE-2016-7620date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:ZDIid:ZDI-16-686date:2017-06-21T00:00:00
db:VULHUBid:VHN-96440date:2017-02-20T00:00:00
db:BIDid:94903date:2016-12-13T00:00:00
db:JVNDBid:JVNDB-2016-007396date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201612-500date:2016-12-15T00:00:00
db:NVDid:CVE-2016-7620date:2017-02-20T08:59:02.790