ID

VAR-201804-1057


CVE

CVE-2017-7066


TITLE

Apple iOS and tvOS of Wi-Fi Service disruption in components (DoS) Vulnerability made into a state

Trust: 0.8

sources: JVNDB: JVNDB-2017-013149

DESCRIPTION

An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. tvOS before 10.2.2 is affected. The issue involves the "Wi-Fi" component. It allows attackers to cause a denial of service (memory corruption on the Wi-Fi chip) by leveraging proximity for 802.11. in the United States. Apple iOS is an operating system developed for mobile devices. tvOS is a smart TV operating system. Wi-Fi is one of the wireless Internet access components. A security vulnerability exists in the Wi-Fi component in Apple iOS versions prior to 10.3.3 and tvOS versions prior to 10.2.2. Broadcom: Denial of service and OOB read in TCP KeepAlive Offloading CVE-2017-7066 Broadcom produces Wi-Fi HardMAC SoCs which are used to handle the PHY and MAC layer processing. These chips are present in both mobile devices and Wi-Fi routers, and are capable of handling many Wi-Fi related events without delegating to the host OS. In order to reduce overhead on the host, some Broadcom Wi-Fi chips support TCP ACK Offloading. When this feature is enabled, the firmware keeps a list of active TCP connections, including the 4-tuple, the SEQ/ACK numbers, etc. Before performing the offloading operation, incoming TCP packets are verified to ensure they are valid. During this verification process, the incoming packets' checksums are calculated. For IPv4 packets, the IPv4 header checksum and TCP/IPv4 checksum are calculated and compared to the checksums in the incoming packet. On the BCM4355C0 SoC with firmware version 9.44.78.27.0.1.56, the offloading verification is performed in RAM function 0x1800C8. Here is a snippet of the approximate high-level logic for this function: int function_1800C8(void* ctx, void* packet) { char* packet_data = *((char**)(packet + 8)); unsigned short packet_length = *((unsigned short*)(packet + 12)); char* packet_end = packet_data + packet_length; //Getting the ethertype. If there's a SNAP header, get the ethertype from SNAP. //Is this IPv4? if (ethertype == 0x800) { unsigned ip_header_length = (ip_header[0] & 0xF) * 4; //IHL * 4 char* tcp_header = ip_header + ip_header_length; if (tcp_header > packet_end) return 0; //Make sure this is TCP if (ip_header[9] != 6) //IPv4->Protocol == TCP return 0; //Making sure the IP total length is valid unsigned short ip_total_length = (ip_header[2] << 8) | ip_header[3]; unsigned tcp_length = ip_total_length - ip_header_length; if (tcp_header + tcp_length > packet_end) return 0; //Verify IPv4 checksum unsigned short ipv4_checksum = *((unsigned short*)(ip_header+10)); if (ipv4_checksum != do_ipv4_checksum(ip_header, ip_header_length)) return 0; //Verify TCP/IPv4 checksum unsigned short tcp_checksum = *((unsigned short*)(tcp_header+16)); if (tcp_checksum != do_tcp_ipv4_checksum(ip_header, tcp_header, tcp_length)) return 0; ... } ... } unsigned short do_ipv4_checksum(char* ip, unsigned len) { ... return internal_calculate_ipv4_checksum(..., ip + 12, len - 12); } unsigned short do_tcp_ipv4_checksum(char* ip, char* tcp, unsigned len) { ... return internal_calculate_tcp_ipv4_checksum(..., ip + 18, len - 18); } As can be seen above, there are a few missing length verifications in the snippet above: 1. The IHL field in the IPv4 header is not verified against in minimal allowed value (5). This means an attacker can provide an intentionally small value, such as zero. Doing so will cause the following accesses to be performed OOB (such as checking the IP header's protocol field, calculating the IPv4 checksum, etc). 2. The IP total length field is also not verified. An attacker can choose the total length field such that ip_total_length == ip_header_length. By doing so, tcp_length will contain the value zero. However, as the unsigned value (tcp_length - 12) is used as the length field in the internal TCP/IPv4 checksum calculation, this will cause the internal checksum calculation loop (RAM function 0x16DBF6) to receive a very large length field - causing an data abort due to an illegal access which will therefore crash the firmware. The bug can be addressed by validating that the IHL is not smaller than the minimal allowed value (5), and by ensuring that the IP total length field is large enough to contain the IPv4 and TCP headers. This bug is subject to a 90 day disclosure deadline. After 90 days elapse or a patch has been made broadly available, the bug report will become visible to the public. Found by: laginimaineb

Trust: 1.8

sources: NVD: CVE-2017-7066 // JVNDB: JVNDB-2017-013149 // VULHUB: VHN-115269 // PACKETSTORM: 144365

IOT TAXONOMY

category:['home & office device', 'embedded device']sub_category:chip

Trust: 0.1

category:['home & office device', 'embedded device']sub_category:TV

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:ltversion:10.3.3

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:10.2.2

Trust: 1.0

vendor:applemodel:iosscope:ltversion:10.3.3 (ipad first 4 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:10.3.3 (iphone 5 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:10.3.3 (ipod touch first 6 generation )

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:10.2.2 (apple tv first 4 generation )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:10.0.3

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.2.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.3

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.1.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.3.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:10.3.2

Trust: 0.6

sources: JVNDB: JVNDB-2017-013149 // CNNVD: CNNVD-201804-206 // NVD: CVE-2017-7066

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7066
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-7066
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201804-206
value: MEDIUM

Trust: 0.6

VULHUB: VHN-115269
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2017-7066
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-115269
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7066
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-115269 // JVNDB: JVNDB-2017-013149 // CNNVD: CNNVD-201804-206 // NVD: CVE-2017-7066

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-115269 // JVNDB: JVNDB-2017-013149 // NVD: CVE-2017-7066

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201804-206

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201804-206

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-013149

PATCH

title:HT207923url:https://support.apple.com/en-us/HT207923

Trust: 0.8

title:HT207924url:https://support.apple.com/en-us/HT207924

Trust: 0.8

title:HT207924url:https://support.apple.com/ja-jp/HT207924

Trust: 0.8

title:HT207923url:https://support.apple.com/ja-jp/HT207923

Trust: 0.8

title:Apple iOS and tvOS Wi-Fi Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83058

Trust: 0.6

sources: JVNDB: JVNDB-2017-013149 // CNNVD: CNNVD-201804-206

EXTERNAL IDS

db:NVDid:CVE-2017-7066

Trust: 2.7

db:JVNDBid:JVNDB-2017-013149

Trust: 0.8

db:CNNVDid:CNNVD-201804-206

Trust: 0.7

db:PACKETSTORMid:144365

Trust: 0.2

db:OTHERid:NONE

Trust: 0.1

db:SEEBUGid:SSVID-96605

Trust: 0.1

db:VULHUBid:VHN-115269

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-115269 // JVNDB: JVNDB-2017-013149 // PACKETSTORM: 144365 // CNNVD: CNNVD-201804-206 // NVD: CVE-2017-7066

REFERENCES

url:https://support.apple.com/ht207923

Trust: 1.7

url:https://support.apple.com/ht207924

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-7066

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7066

Trust: 0.8

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // VULHUB: VHN-115269 // JVNDB: JVNDB-2017-013149 // PACKETSTORM: 144365 // CNNVD: CNNVD-201804-206 // NVD: CVE-2017-7066

CREDITS

Google Security Research, laginimaineb

Trust: 0.1

sources: PACKETSTORM: 144365

SOURCES

db:OTHERid: -
db:VULHUBid:VHN-115269
db:JVNDBid:JVNDB-2017-013149
db:PACKETSTORMid:144365
db:CNNVDid:CNNVD-201804-206
db:NVDid:CVE-2017-7066

LAST UPDATE DATE

2025-01-30T19:31:24.001000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-115269date:2019-03-08T00:00:00
db:JVNDBid:JVNDB-2017-013149date:2018-06-01T00:00:00
db:CNNVDid:CNNVD-201804-206date:2019-03-13T00:00:00
db:NVDid:CVE-2017-7066date:2024-11-21T03:31:06.307

SOURCES RELEASE DATE

db:VULHUBid:VHN-115269date:2018-04-03T00:00:00
db:JVNDBid:JVNDB-2017-013149date:2018-06-01T00:00:00
db:PACKETSTORMid:144365date:2017-09-27T13:35:19
db:CNNVDid:CNNVD-201804-206date:2018-04-04T00:00:00
db:NVDid:CVE-2017-7066date:2018-04-03T06:29:01.953