SB2017110101 - Multiple vulnerabilities in Apple iOS



SB2017110101 - Multiple vulnerabilities in Apple iOS

Published: November 1, 2017 Updated: December 25, 2017

Security Bulletin ID SB2017110101
Severity
High
Patch available
YES
Number of vulnerabilities 21
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 76% Medium 5% Low 19%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 21 secuirty vulnerabilities.


1) Memory corruption (CVE-ID: CVE-2017-13849)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to memory handling error in the CoreText component. A remote attacker can supply a specially crafted text file, trigger memory corruption and cause an unexpected application termination.

2) Memory corruption (CVE-ID: CVE-2017-13799)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the kernel component. A remote attacker can trigger memory corruption and execute arbitrary code with kernel privileges.

3) Improper access control (CVE-ID: CVE-2017-13844)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a flaw in the Messages application. A local attacker can supply Reply With Message and access photos from the lock screen.

4) Improper access control (CVE-ID: CVE-2017-13805)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a flaw in the Siri component. A local attacker can use Siri to read notifications of content that is set not to be displayed at the lock screen.

5) Improper input validation (CVE-ID: CVE-2017-13804)

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper input validation. A remote attacker can trick the victim into opening a specially crafted zip file, trigger a path handling flaw in the StreamingZip component and modify restricted areas of the file system.

6) Improper access control (CVE-ID: CVE-2017-7113)

The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a flaw in the UIKit component. A local attacker can view characters in a secure text field during focus change events.

7) Memory corruption (CVE-ID: CVE-2017-13783)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

8) Memory corruption (CVE-ID: CVE-2017-13784)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

9) Memory corruption (CVE-ID: CVE-2017-13785)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

10) Memory corruption (CVE-ID: CVE-2017-13788)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

11) Memory corruption (CVE-ID: CVE-2017-13791)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

12) Memory corruption (CVE-ID: CVE-2017-13792)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

13) Memory corruption (CVE-ID: CVE-2017-13793)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

14) Memory corruption (CVE-ID: CVE-2017-13794)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

15) Memory corruption (CVE-ID: CVE-2017-13795)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

16) Memory corruption (CVE-ID: CVE-2017-13796)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

17) Memory corruption (CVE-ID: CVE-2017-13798)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

18) Memory corruption (CVE-ID: CVE-2017-13802)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

19) Memory corruption (CVE-ID: CVE-2017-13803)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

20) Key management errors (CVE-ID: CVE-2017-13080)

The vulnerability allows an adjacent attacker to force a supplicant to reinstall a previously used group key.

The weakness exists in the processing of the 802.11i 4-way handshake messages of the WPA and WPA2 protocols due to ambiguities in the processing of associated protocol messages. An adjacent attacker can use man-in-the-middle techniques to retransmit previously used message exchanges between supplicant and authenticator.

The vulnerability is dubbed "KRACK" attack.

21) Use-after-free error (CVE-ID: CVE-2017-13797)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to use-after-free error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.

Remediation

Install update from vendor's website.