VARIoT IoT vulnerabilities database
| VAR-201508-0053 | CVE-2015-5784 | Apple OS X of Install Framework Legacy Component vulnerable to arbitrary code execution in privileged context |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
runner in Install.framework in the Install Framework Legacy component in Apple OS X before 10.10.5 does not properly drop privileges, which allows attackers to execute arbitrary code in a privileged context via a crafted app. Apple Mac OS X is prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks.
Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability).
These issues affect OS X prior to 10.10.5. Install Framework Legacy is one of the installation framework components
| VAR-201508-0052 | CVE-2015-5783 | Apple OS X of IOGraphics Vulnerable to arbitrary code execution |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
IOGraphics in Apple OS X before 10.10.5 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-3770.
Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks.
Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability).
These issues affect OS X prior to 10.10.5
| VAR-201508-0050 | CVE-2015-5781 | Apple iOS and OS X of ImageIO Vulnerability in which important information is obtained from process memory |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 does not properly initialize an unspecified data structure, which allows remote attackers to obtain sensitive information from process memory via a crafted PNG image. Apple Mac OS X and iOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States. ImageIO is one of the static methods used to perform common image I/O operations
| VAR-201508-0051 | CVE-2015-5782 | Apple iOS and OS X of ImageIO Vulnerability in which important information is obtained from process memory |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 does not properly initialize an unspecified data structure, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image. Apple Mac OS X and iOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States. ImageIO is one of the static methods used to perform common image I/O operations
| VAR-201508-0048 | CVE-2015-5778 | Apple iOS and OS X of CoreMedia Playback Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
CoreMedia Playback in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-5777. Apple Mac OS X and iOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States
| VAR-201508-0049 | CVE-2015-5779 | Apple OS X of QuickTime Vulnerable to arbitrary code execution |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
QuickTime 7 in Apple OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file, a different vulnerability than CVE-2015-3765, CVE-2015-3779, CVE-2015-3788, CVE-2015-3789, CVE-2015-3790, CVE-2015-3791, CVE-2015-3792, CVE-2015-5751, and CVE-2015-5753. Apple Mac OS X is prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks.
Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability).
These issues affect OS X prior to 10.10.5. QuickTime is one of the multimedia playback components. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2015-08-20-1 QuickTime 7.7.8
QuickTime 7.7.8 is now available and addresses the following:
QuickTime
Available for: Windows 7 and Windows Vista
Impact: Processing a maliciously crafted file may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in QuickTime.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-3788 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3789 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3790 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3791 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-3792 : Ryan Pentney and Richard Johnson of Cisco Talos
CVE-2015-5751 : WalkerFuz
CVE-2015-5779 : Apple
CVE-2015-5785 : Fortinet's FortiGuard Labs
CVE-2015-5786 : Ryan Pentney and Richard Johnson of Cisco Talos
QuickTime 7.7.8 may be obtained from the QuickTime Downloads site:
http://www.apple.com/quicktime/download/
You may also update to the latest version of QuickTime via Apple
Software Update, which can be found in the Start menu.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org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=ThbL
-----END PGP SIGNATURE-----
| VAR-201508-0046 | CVE-2015-5776 | Apple iOS and OS X of Libinfo Vulnerable to arbitrary code execution |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Libinfo in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by leveraging use of an AF_INET6 socket. Apple Mac OS X and iOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States
| VAR-201508-0047 | CVE-2015-5777 | Apple iOS and OS X of CoreMedia Playback Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
CoreMedia Playback in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-5778. Apple Mac OS X and iOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States
| VAR-201508-0045 | CVE-2015-5775 | Apple iOS and OS X of FontParser Vulnerable to arbitrary code execution |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
FontParser in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-3804 and CVE-2015-5756.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States. FontParser is a font parsing component
| VAR-201508-0043 | CVE-2015-5773 | Apple iOS and OS X of QL Office Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
QL Office in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted office document. Apple Mac OS X and iOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States
| VAR-201508-0044 | CVE-2015-5774 | Apple iOS and OS X of IOHIDFamily Vulnerable to buffer overflow |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Buffer overflow in IOHIDFamily in Apple iOS before 8.4.1 and OS X before 10.10.5 allows local users to gain privileges via unspecified vectors.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States. A local attacker could exploit this vulnerability to gain privileges
| VAR-201508-0042 | CVE-2015-5772 | Apple OS X of SceneKit Heap-based buffer overflow vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Heap-based buffer overflow in SceneKit in Apple OS X before 10.10.5 allows remote attackers to execute arbitrary code via a crafted Collada file. Apple Mac OS X is prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks.
Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability).
These issues affect OS X prior to 10.10.5. SceneKit is one of the 3D rendering frameworks
| VAR-201508-0041 | CVE-2015-5771 | Apple OS X of Quartz Composer Framework Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Quartz Composer Framework in Apple OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted QuickTime file. Apple Mac OS X is prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks.
Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability).
These issues affect OS X prior to 10.10.5. Quartz Composer is one of the animation composition frameworks
| VAR-201508-0040 | CVE-2015-5770 | Apple iOS of MobileInstallation Vulnerabilities that could replace arbitrary extensions |
CVSS V2: 5.8 CVSS V3: - Severity: MEDIUM |
MobileInstallation in Apple iOS before 8.4.1 does not ensure the uniqueness of universal provisioning profile bundle IDs, which allows attackers to replace arbitrary extensions via a crafted enterprise app. Apple iOS is prone to multiple security vulnerabilities.
Attackers can exploit these issues to access sensitive information, perform unauthorized actions, bypass security restrictions, and perform other attacks.
Versions prior to iOS 8.4.1 are vulnerable.
Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability). Apple iOS is an operating system developed by Apple (Apple) for mobile devices. MobileInstallation is a necessary component to install AppStore cracked software
| VAR-201508-0038 | CVE-2015-5768 | Apple OS X of AppleGraphicsControl Vulnerable to obtaining critical kernel memory layout information |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
AppleGraphicsControl in Apple OS X before 10.10.5 allows attackers to obtain sensitive kernel memory-layout information via a crafted app. Apple Mac OS X is prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks.
Note: The issue described by CVE-2015-3778 has been removed.
These issues affect OS X prior to 10.10.5. AppleGraphicsControl is one of the integrated graphics drivers
| VAR-201508-0039 | CVE-2015-5769 | Apple iOS of MSVDX Service disruption in drivers (DoS) Vulnerabilities |
CVSS V2: 7.1 CVSS V3: - Severity: HIGH |
The MSVDX driver in Apple iOS before 8.4.1 allows remote attackers to cause a denial of service (device crash) via a crafted video. Apple iOS is prone to multiple security vulnerabilities.
Attackers can exploit these issues to access sensitive information, perform unauthorized actions, bypass security restrictions, and perform other attacks.
Versions prior to iOS 8.4.1 are vulnerable.
Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability). Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201508-0037 | CVE-2015-5766 | Apple iOS of Air Traffic Vulnerable to directory traversal |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Directory traversal vulnerability in Air Traffic in Apple iOS before 8.4.1 allows attackers to access arbitrary filesystem locations via vectors related to asset handling. Apple iOS is prone to multiple security vulnerabilities.
Attackers can exploit these issues to access sensitive information, perform unauthorized actions, bypass security restrictions, and perform other attacks.
Versions prior to iOS 8.4.1 are vulnerable.
Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability). Apple iOS is an operating system developed by Apple (Apple) for mobile devices. The vulnerability stems from the program not properly handling assets. An attacker could exploit this vulnerability to access arbitrary file system locations
| VAR-201508-0036 | CVE-2015-5763 | Apple OS X of NTFS Vulnerability gained in |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
ntfs in Apple OS X before 10.10.5 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. Apple Mac OS X is prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks.
Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability).
These issues affect OS X prior to 10.10.5
| VAR-201508-0035 | CVE-2015-5761 | Apple iOS and OS X of CoreText Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
CoreText in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted font file, a different vulnerability than CVE-2015-5755.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States. CoreText is one of the text engines that can control text formatting and text layout
| VAR-201508-0033 | CVE-2015-5758 | Apple iOS and OS X of ImageIO Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image. Apple Mac OS X and iOS are prone to multiple security vulnerabilities.
Attackers can exploit these issues to obtain sensitive information, execute arbitrary code with system privileges, perform unauthorized actions, bypass security restrictions, cause denial-of-service conditions, and perform other attacks.
Versions prior to iOS 8.4.1 and OS X 10.10.5 are vulnerable. in the United States. ImageIO is one of the static methods used to perform common image I/O operations