ID

VAR-201702-0228


CVE

CVE-2016-7629


TITLE

Apple macOS of kext Tool component vulnerable to arbitrary code execution in privileged context

Trust: 0.8

sources: JVNDB: JVNDB-2016-007401

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "kext tools" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. Apple macOS is prone to multiple security vulnerabilities. kext tools is one of the system driver installation and permission repair components

Trust: 1.98

sources: NVD: CVE-2016-7629 // JVNDB: JVNDB-2016-007401 // BID: 94903 // VULHUB: VHN-96449

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.12.1

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.12.1

Trust: 1.0

vendor:applemodel:macosscope:eqversion:10.12.1

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.12.2

Trust: 0.3

sources: BID: 94903 // JVNDB: JVNDB-2016-007401 // CNNVD: CNNVD-201612-501 // NVD: CVE-2016-7629

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-7629
value: HIGH

Trust: 1.0

NVD: CVE-2016-7629
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201612-501
value: CRITICAL

Trust: 0.6

VULHUB: VHN-96449
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-7629
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-96449
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-7629
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-96449 // JVNDB: JVNDB-2016-007401 // CNNVD: CNNVD-201612-501 // NVD: CVE-2016-7629

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-96449 // JVNDB: JVNDB-2016-007401 // NVD: CVE-2016-7629

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201612-501

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201612-501

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007401

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-12-13-1 macOS 10.12.2url:https://lists.apple.com/archives/security-announce/2016/Dec/msg00003.html

Trust: 0.8

title:HT207423url:https://support.apple.com/en-us/HT207423

Trust: 0.8

title:HT207423url:https://support.apple.com/ja-jp/HT207423

Trust: 0.8

title:Apple macOS Sierra kext tools Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66535

Trust: 0.6

sources: JVNDB: JVNDB-2016-007401 // CNNVD: CNNVD-201612-501

EXTERNAL IDS

db:NVDid:CVE-2016-7629

Trust: 2.8

db:BIDid:94903

Trust: 2.0

db:SECTRACKid:1037469

Trust: 1.1

db:JVNid:JVNVU97133642

Trust: 0.8

db:JVNDBid:JVNDB-2016-007401

Trust: 0.8

db:CNNVDid:CNNVD-201612-501

Trust: 0.7

db:VULHUBid:VHN-96449

Trust: 0.1

sources: VULHUB: VHN-96449 // BID: 94903 // JVNDB: JVNDB-2016-007401 // CNNVD: CNNVD-201612-501 // NVD: CVE-2016-7629

REFERENCES

url:http://www.securityfocus.com/bid/94903

Trust: 1.7

url:https://support.apple.com/ht207423

Trust: 1.7

url:http://www.securitytracker.com/id/1037469

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7629

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97133642/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-7629

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

sources: VULHUB: VHN-96449 // BID: 94903 // JVNDB: JVNDB-2016-007401 // CNNVD: CNNVD-201612-501 // NVD: CVE-2016-7629

CREDITS

daybreaker@Minionz working with Trend Micro's Zero Day Initiative, an anonymous researcher, Pekka Oikarainen, Matias Karhumaa and Marko Laakso of Synopsys Software Integrity Group, daybreaker of Minionz, Radu Motspan working with Trend Micro's Zero Day In

Trust: 0.6

sources: CNNVD: CNNVD-201612-501

SOURCES

db:VULHUBid:VHN-96449
db:BIDid:94903
db:JVNDBid:JVNDB-2016-007401
db:CNNVDid:CNNVD-201612-501
db:NVDid:CVE-2016-7629

LAST UPDATE DATE

2025-04-20T20:26:54.984000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-96449date:2017-07-27T00:00:00
db:BIDid:94903date:2016-12-20T00:09:00
db:JVNDBid:JVNDB-2016-007401date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201612-501date:2017-03-01T00:00:00
db:NVDid:CVE-2016-7629date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-96449date:2017-02-20T00:00:00
db:BIDid:94903date:2016-12-13T00:00:00
db:JVNDBid:JVNDB-2016-007401date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201612-501date:2016-12-15T00:00:00
db:NVDid:CVE-2016-7629date:2017-02-20T08:59:03.087