ID

VAR-201702-0224


CVE

CVE-2016-7625


TITLE

Apple macOS of IOKit Vulnerability in obtaining important kernel memory layout information in component

Trust: 0.8

sources: JVNDB: JVNDB-2016-007399

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "IOKit" component. It allows local users to obtain sensitive kernel memory-layout information via unspecified vectors. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within IOReportUserClient. The process does not properly validate user-supplied data which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges under the context of the kernel. Apple macOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code, perform unauthorized actions, obtain sensitive information, gain elevated privileges or cause a denial-of-service condition. IOKit is one of the components that read system information

Trust: 2.61

sources: NVD: CVE-2016-7625 // JVNDB: JVNDB-2016-007399 // ZDI: ZDI-16-687 // BID: 94903 // VULHUB: VHN-96445

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.12.1

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.12.1

Trust: 1.0

vendor:applemodel:macosscope: - version: -

Trust: 0.7

vendor:applemodel:macosscope:eqversion:10.12.1

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.12.2

Trust: 0.3

sources: ZDI: ZDI-16-687 // BID: 94903 // JVNDB: JVNDB-2016-007399 // CNNVD: CNNVD-201612-499 // NVD: CVE-2016-7625

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-7625
value: LOW

Trust: 1.0

NVD: CVE-2016-7625
value: LOW

Trust: 0.8

ZDI: CVE-2016-7625
value: MEDIUM

Trust: 0.7

CNNVD: CNNVD-201612-499
value: LOW

Trust: 0.6

VULHUB: VHN-96445
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2016-7625
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

ZDI: CVE-2016-7625
severity: MEDIUM
baseScore: 4.9
vectorString: AV:L/AC:L/AU:N/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-96445
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-7625
baseSeverity: LOW
baseScore: 3.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 1.4
version: 3.0

Trust: 1.8

sources: ZDI: ZDI-16-687 // VULHUB: VHN-96445 // JVNDB: JVNDB-2016-007399 // CNNVD: CNNVD-201612-499 // NVD: CVE-2016-7625

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-96445 // JVNDB: JVNDB-2016-007399 // NVD: CVE-2016-7625

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201612-499

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201612-499

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007399

PATCH

title:HT207423url:https://support.apple.com/en-us/HT207423

Trust: 1.5

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-12-13-1 macOS 10.12.2url:https://lists.apple.com/archives/security-announce/2016/Dec/msg00003.html

Trust: 0.8

title:HT207423url:https://support.apple.com/ja-jp/HT207423

Trust: 0.8

title:Apple macOS Sierra IOKit Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66533

Trust: 0.6

sources: ZDI: ZDI-16-687 // JVNDB: JVNDB-2016-007399 // CNNVD: CNNVD-201612-499

EXTERNAL IDS

db:NVDid:CVE-2016-7625

Trust: 3.5

db:BIDid:94903

Trust: 2.0

db:SECTRACKid:1037469

Trust: 1.1

db:JVNid:JVNVU97133642

Trust: 0.8

db:JVNDBid:JVNDB-2016-007399

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-3856

Trust: 0.7

db:ZDIid:ZDI-16-687

Trust: 0.7

db:CNNVDid:CNNVD-201612-499

Trust: 0.7

db:VULHUBid:VHN-96445

Trust: 0.1

sources: ZDI: ZDI-16-687 // VULHUB: VHN-96445 // BID: 94903 // JVNDB: JVNDB-2016-007399 // CNNVD: CNNVD-201612-499 // NVD: CVE-2016-7625

REFERENCES

url:http://www.securityfocus.com/bid/94903

Trust: 1.7

url:https://support.apple.com/ht207423

Trust: 1.7

url:http://www.securitytracker.com/id/1037469

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7625

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97133642/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-7625

Trust: 0.8

url:https://support.apple.com/en-us/ht207423

Trust: 0.7

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

sources: ZDI: ZDI-16-687 // VULHUB: VHN-96445 // BID: 94903 // JVNDB: JVNDB-2016-007399 // CNNVD: CNNVD-201612-499 // NVD: CVE-2016-7625

CREDITS

Qidan He(@flanker_hqd) from KeenLab

Trust: 0.7

sources: ZDI: ZDI-16-687

SOURCES

db:ZDIid:ZDI-16-687
db:VULHUBid:VHN-96445
db:BIDid:94903
db:JVNDBid:JVNDB-2016-007399
db:CNNVDid:CNNVD-201612-499
db:NVDid:CVE-2016-7625

LAST UPDATE DATE

2025-04-20T22:50:40.091000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-16-687date:2017-06-21T00:00:00
db:VULHUBid:VHN-96445date:2017-07-27T00:00:00
db:BIDid:94903date:2016-12-20T00:09:00
db:JVNDBid:JVNDB-2016-007399date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201612-499date:2017-03-01T00:00:00
db:NVDid:CVE-2016-7625date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:ZDIid:ZDI-16-687date:2017-06-21T00:00:00
db:VULHUBid:VHN-96445date:2017-02-20T00:00:00
db:BIDid:94903date:2016-12-13T00:00:00
db:JVNDBid:JVNDB-2016-007399date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201612-499date:2016-12-15T00:00:00
db:NVDid:CVE-2016-7625date:2017-02-20T08:59:02.963