Vulnerabilities > CVE-2016-4655 - Unspecified vulnerability in Apple Iphone OS

047910
CVSS 5.5 - MEDIUM
Attack vector
LOCAL
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
HIGH
Integrity impact
NONE
Availability impact
NONE
local
low complexity
apple
nessus
exploit available
metasploit

Summary

The kernel in Apple iOS before 9.3.5 allows attackers to obtain sensitive information from memory via a crafted app.

Vulnerable Configurations

Part Description Count
OS
Apple
148

Exploit-Db

descriptionWebKit - not_number defineProperties UAF (Metasploit). CVE-2016-4655,CVE-2016-4656,CVE-2016-4657. Remote exploit for iOS platform. Tags: Metasploit Framework...
fileexploits/ios/remote/44836.rb
idEDB-ID:44836
last seen2018-06-05
modified2018-06-05
platformios
port
published2018-06-05
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/44836/
titleWebKit - not_number defineProperties UAF (Metasploit)
typeremote

Nessus

NASL familyMacOS X Local Security Checks
NASL idMACOSX_SECUPD2016-005.NASL
descriptionThe remote host is running a version of Mac OS X 10.10.5 or 10.11.6 that is missing a security update. It is therefore, affected by multiple vulnerabilities in the Kernel component : - An unspecified flaw exists due to improper validation of user-supplied input. An attacker can exploit this, by convincing a user to run a specially crafted application, to disclose kernel memory contents. (CVE-2016-4655) - An unspecified flaw exists due to improper validation of certain input. An attacker can exploit this, by convincing a user to run a specially crafted application, to execute arbitrary code with kernel level privileges. (CVE-2016-4656)
last seen2020-06-01
modified2020-06-02
plugin id93317
published2016-09-02
reporterThis script is Copyright (C) 2016-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/93317
titleMac OS X Multiple Vulnerabilities (Security Updates 2016-001 / 2016-005)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(93317);
  script_version("1.10");
  script_cvs_date("Date: 2018/07/14  1:59:36");

  script_cve_id("CVE-2016-4655", "CVE-2016-4656");
  script_bugtraq_id(92651, 92652);
  script_xref(name:"APPLE-SA", value:"APPLE-SA-2016-09-01-2");

  script_name(english:"Mac OS X Multiple Vulnerabilities (Security Updates 2016-001 / 2016-005)");
  script_summary(english:"Checks for the presence of Security Update 2016-001 and 2016-005.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a Mac OS X update that fixes multiple
security vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The remote host is running a version of Mac OS X 10.10.5 or 10.11.6
that is missing a security update. It is therefore, affected by
multiple vulnerabilities in the Kernel component :

  - An unspecified flaw exists due to improper validation of
    user-supplied input. An attacker can exploit this, by
    convincing a user to run a specially crafted
    application, to disclose kernel memory contents.
    (CVE-2016-4655)

  - An unspecified flaw exists due to improper validation of
    certain input. An attacker can exploit this, by
    convincing a user to run a specially crafted
    application, to execute arbitrary code with kernel level
    privileges. (CVE-2016-4656)");
  script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT207130");
  # http://lists.apple.com/archives/security-announce/2016/Sep/msg00001.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?faffe2b4");
  script_set_attribute(attribute:"solution", value:
"Install Security Update 2016-005 (OS X 10.10.5) / 2016-001 (OS X
10.11.6) or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'WebKit not_number defineProperties UAF');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2016/08/25");
  script_set_attribute(attribute:"patch_publication_date", value:"2016/09/01");
  script_set_attribute(attribute:"plugin_publication_date", value:"2016/09/02");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"MacOS X Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2016-2018 Tenable Network Security, Inc.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/MacOSX/Version", "Host/MacOSX/packages/boms");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

# Compare 2 patch numbers to determine if patch requirements are satisfied.
# Return true if this patch or a later patch is applied
# Return false otherwise
function check_patch(year, number)
{
  local_var p_split = split(patch, sep:"-");
  local_var p_year  = int( p_split[0]);
  local_var p_num   = int( p_split[1]);

  if (year >  p_year) return TRUE;
  else if (year <  p_year) return FALSE;
  else if (number >=  p_num) return TRUE;
  else return FALSE;
}

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);

# Advisory states that update 2016-005 is available for 10.10.5 and update 2016-001 is available for 10.11.6
os = get_kb_item("Host/MacOSX/Version");
if (!os) audit(AUDIT_OS_NOT, "Mac OS X");
if (!ereg(pattern:"Mac OS X 10\.(10\.5|11\.6)([^0-9]|$)", string:os)) audit(AUDIT_OS_NOT, "Mac OS X 10.10.5 or Mac OS X 10.11.6");

if ( "10.10.5" >< os) patch = "2016-005";
else if ( "10.11.6" >< os ) patch = "2016-001";

packages = get_kb_item_or_exit("Host/MacOSX/packages/boms", exit_code:1);
sec_boms_report = egrep(pattern:"^com\.apple\.pkg\.update\.(security\.|os\.SecUpd).*bom$", string:packages);
sec_boms = split(sec_boms_report, sep:'\n');

foreach package (sec_boms)
{
  # Grab patch year and number
  match = eregmatch(pattern:"[^0-9](20[0-9][0-9])[-.]([0-9]{3})[^0-9]", string:package);
  if (empty_or_null(match[1]) || empty_or_null(match[2]))
    continue;

  patch_found = check_patch(year:int(match[1]), number:int(match[2]));
  if (patch_found) exit(0, "The host has Security Update " + patch + " or later installed and is therefore not affected.");
}

report =  '\n  Missing security update : ' + patch;
report += '\n  Installed security BOMs : ';
if (sec_boms_report) report += str_replace(find:'\n', replace:'\n                            ', string:sec_boms_report);
else report += 'n/a';
report += '\n';

security_report_v4(port:0, severity:SECURITY_HOLE, extra:report);

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/148041/webkit_trident.rb.txt
idPACKETSTORM:148041
last seen2018-06-05
published2018-06-04
reportertimwr
sourcehttps://packetstormsecurity.com/files/148041/WebKit-not_number-defineProperties-Use-After-Free.html
titleWebKit not_number defineProperties Use-After-Free

The Hacker News

idTHN:32ED4C0A7FA3A0F0A9A708FC243A644D
last seen2018-01-27
modified2016-09-02
published2016-09-01
reporterSwati Khandelwal
sourcehttps://thehackernews.com/2016/09/apple-mac-os-x-update.html
titleUpdate your Mac OS X — Apple has released Important Security Updates