ID

VAR-201702-0266


CVE

CVE-2016-7742


TITLE

Apple macOS of xar Vulnerability in arbitrary code execution in components

Trust: 0.8

sources: JVNDB: JVNDB-2016-007416

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "xar" component, which allows remote attackers to execute arbitrary code via a crafted archive that triggers use of uninitialized memory locations. Apple macOS is prone to an arbitrary code-execution vulnerability. Failed exploit attempts will result in a denial-of-service condition. Versions prior to macOS 10.12.2 are vulnerable. Apple macOS Sierra is a dedicated operating system developed by Apple for Mac computers. xar is one of those tools that provides an easily extensible archive format

Trust: 1.98

sources: NVD: CVE-2016-7742 // JVNDB: JVNDB-2016-007416 // BID: 96331 // VULHUB: VHN-96562

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.12.1

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.12.1

Trust: 1.0

vendor:applemodel:macosscope:eqversion:10.12.1

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.12.2

Trust: 0.3

sources: BID: 96331 // JVNDB: JVNDB-2016-007416 // CNNVD: CNNVD-201702-713 // NVD: CVE-2016-7742

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-7742
value: HIGH

Trust: 1.0

NVD: CVE-2016-7742
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201702-713
value: MEDIUM

Trust: 0.6

VULHUB: VHN-96562
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-7742
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-96562
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-7742
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-96562 // JVNDB: JVNDB-2016-007416 // CNNVD: CNNVD-201702-713 // NVD: CVE-2016-7742

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-96562 // JVNDB: JVNDB-2016-007416 // NVD: CVE-2016-7742

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-713

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201702-713

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007416

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-12-13-1 macOS 10.12.2url:https://lists.apple.com/archives/security-announce/2016/Dec/msg00003.html

Trust: 0.8

title:HT207423url:https://support.apple.com/en-us/HT207423

Trust: 0.8

title:HT207423url:https://support.apple.com/ja-jp/HT207423

Trust: 0.8

title:Apple macOS Sierra xar Fixes for component input validation vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68140

Trust: 0.6

sources: JVNDB: JVNDB-2016-007416 // CNNVD: CNNVD-201702-713

EXTERNAL IDS

db:NVDid:CVE-2016-7742

Trust: 2.8

db:JVNid:JVNVU97133642

Trust: 0.8

db:JVNDBid:JVNDB-2016-007416

Trust: 0.8

db:CNNVDid:CNNVD-201702-713

Trust: 0.7

db:BIDid:96331

Trust: 0.4

db:VULHUBid:VHN-96562

Trust: 0.1

sources: VULHUB: VHN-96562 // BID: 96331 // JVNDB: JVNDB-2016-007416 // CNNVD: CNNVD-201702-713 // NVD: CVE-2016-7742

REFERENCES

url:https://support.apple.com/ht207423

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7742

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97133642/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-7742

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:https://support.apple.com/en-us/ht207423

Trust: 0.3

sources: VULHUB: VHN-96562 // BID: 96331 // JVNDB: JVNDB-2016-007416 // CNNVD: CNNVD-201702-713 // NVD: CVE-2016-7742

CREDITS

Gareth Evans of Context Information Security.

Trust: 0.3

sources: BID: 96331

SOURCES

db:VULHUBid:VHN-96562
db:BIDid:96331
db:JVNDBid:JVNDB-2016-007416
db:CNNVDid:CNNVD-201702-713
db:NVDid:CVE-2016-7742

LAST UPDATE DATE

2025-04-20T22:24:03.068000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-96562date:2017-02-21T00:00:00
db:BIDid:96331date:2017-03-07T01:05:00
db:JVNDBid:JVNDB-2016-007416date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201702-713date:2017-02-22T00:00:00
db:NVDid:CVE-2016-7742date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-96562date:2017-02-20T00:00:00
db:BIDid:96331date:2017-02-20T00:00:00
db:JVNDBid:JVNDB-2016-007416date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201702-713date:2017-02-22T00:00:00
db:NVDid:CVE-2016-7742date:2017-02-20T08:59:04.480