ID

VAR-201702-0339


CVE

CVE-2016-4681


TITLE

Apple OS X of Core Image Vulnerability in arbitrary code execution in components

Trust: 0.8

sources: JVNDB: JVNDB-2016-007368

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "Core Image" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG file. Apple Mac OS X is prone to multiple remote code-execution vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the user. Failed exploit attempts will likely cause a denial-of-service condition. Apple macOS Sierra is a dedicated operating system developed by Apple for Mac computers. A memory corruption vulnerability exists in the Core Image component of Apple macOS Sierra prior to 10.12.1

Trust: 1.98

sources: NVD: CVE-2016-4681 // JVNDB: JVNDB-2016-007368 // BID: 94431 // VULHUB: VHN-93500

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.12.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.11.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.12.0

Trust: 0.6

vendor:applemodel:mac osscope:eqversion:x10.11.6

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.12.1

Trust: 0.3

sources: BID: 94431 // JVNDB: JVNDB-2016-007368 // CNNVD: CNNVD-201611-480 // NVD: CVE-2016-4681

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-4681
value: HIGH

Trust: 1.0

NVD: CVE-2016-4681
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201611-480
value: MEDIUM

Trust: 0.6

VULHUB: VHN-93500
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-4681
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-93500
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-4681
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-93500 // JVNDB: JVNDB-2016-007368 // CNNVD: CNNVD-201611-480 // NVD: CVE-2016-4681

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-93500 // JVNDB: JVNDB-2016-007368 // NVD: CVE-2016-4681

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201611-480

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201611-480

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-007368

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2016-10-24-2 macOS Sierra 10.12.1url:https://lists.apple.com/archives/security-announce/2016/Oct/msg00001.html

Trust: 0.8

title:HT207275url:https://support.apple.com/en-us/HT207275

Trust: 0.8

title:HT207275url:https://support.apple.com/ja-jp/HT207275

Trust: 0.8

title:Apple macOS Sierra Core Image Repair measures for memory corruption vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=65817

Trust: 0.6

sources: JVNDB: JVNDB-2016-007368 // CNNVD: CNNVD-201611-480

EXTERNAL IDS

db:NVDid:CVE-2016-4681

Trust: 2.8

db:BIDid:94431

Trust: 2.0

db:JVNid:JVNVU90743185

Trust: 0.8

db:JVNDBid:JVNDB-2016-007368

Trust: 0.8

db:CNNVDid:CNNVD-201611-480

Trust: 0.7

db:VULHUBid:VHN-93500

Trust: 0.1

sources: VULHUB: VHN-93500 // BID: 94431 // JVNDB: JVNDB-2016-007368 // CNNVD: CNNVD-201611-480 // NVD: CVE-2016-4681

REFERENCES

url:http://www.securityfocus.com/bid/94431

Trust: 1.7

url:https://support.apple.com/ht207275

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-4681

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90743185/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-4681

Trust: 0.8

url:https://support.apple.com/en-in/ht207275

Trust: 0.3

url:https://www.apple.com/

Trust: 0.3

sources: VULHUB: VHN-93500 // BID: 94431 // JVNDB: JVNDB-2016-007368 // CNNVD: CNNVD-201611-480 // NVD: CVE-2016-4681

CREDITS

Ke Liu of Tencent???s Xuanwu Lab

Trust: 0.6

sources: CNNVD: CNNVD-201611-480

SOURCES

db:VULHUBid:VHN-93500
db:BIDid:94431
db:JVNDBid:JVNDB-2016-007368
db:CNNVDid:CNNVD-201611-480
db:NVDid:CVE-2016-4681

LAST UPDATE DATE

2025-04-20T21:40:15.231000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-93500date:2017-02-21T00:00:00
db:BIDid:94431date:2016-11-24T00:14:00
db:JVNDBid:JVNDB-2016-007368date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201611-480date:2017-03-13T00:00:00
db:NVDid:CVE-2016-4681date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-93500date:2017-02-20T00:00:00
db:BIDid:94431date:2016-10-25T00:00:00
db:JVNDBid:JVNDB-2016-007368date:2017-02-28T00:00:00
db:CNNVDid:CNNVD-201611-480date:2016-10-25T00:00:00
db:NVDid:CVE-2016-4681date:2017-02-20T08:59:00.870