SB2017110101 - Multiple vulnerabilities in Apple iOS
Published: November 1, 2017 Updated: December 25, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 21 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-13849)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to memory handling error in the CoreText component. A remote attacker can supply a specially crafted text file, trigger memory corruption and cause an unexpected application termination.
2) Memory corruption (CVE-ID: CVE-2017-13799)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the kernel component. A remote attacker can trigger memory corruption and execute arbitrary code with kernel privileges.
3) Improper access control (CVE-ID: CVE-2017-13844)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Messages application. A local attacker can supply Reply With Message and access photos from the lock screen.
4) Improper access control (CVE-ID: CVE-2017-13805)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the Siri component. A local attacker can use Siri to read notifications of content that is set not to be displayed at the lock screen.
5) Improper input validation (CVE-ID: CVE-2017-13804)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to improper input validation. A remote attacker can trick the victim into opening a specially crafted zip file, trigger a path handling flaw in the StreamingZip component and modify restricted areas of the file system.
6) Improper access control (CVE-ID: CVE-2017-7113)
The vulnerability allows a local attacker to obtain potentially sensitive information on the target system.The weakness exists due to a flaw in the UIKit component. A local attacker can view characters in a secure text field during focus change events.
7) Memory corruption (CVE-ID: CVE-2017-13783)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
8) Memory corruption (CVE-ID: CVE-2017-13784)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
9) Memory corruption (CVE-ID: CVE-2017-13785)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
10) Memory corruption (CVE-ID: CVE-2017-13788)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
11) Memory corruption (CVE-ID: CVE-2017-13791)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
12) Memory corruption (CVE-ID: CVE-2017-13792)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
13) Memory corruption (CVE-ID: CVE-2017-13793)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
14) Memory corruption (CVE-ID: CVE-2017-13794)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
15) Memory corruption (CVE-ID: CVE-2017-13795)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
16) Memory corruption (CVE-ID: CVE-2017-13796)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
17) Memory corruption (CVE-ID: CVE-2017-13798)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
18) Memory corruption (CVE-ID: CVE-2017-13802)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
19) Memory corruption (CVE-ID: CVE-2017-13803)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to memory handling error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
20) Key management errors (CVE-ID: CVE-2017-13080)
The vulnerability allows an adjacent attacker to force a supplicant to reinstall a previously used group key.The weakness exists in the processing of the 802.11i 4-way handshake messages of the WPA and WPA2 protocols due to ambiguities in the processing of associated protocol messages. An adjacent attacker can use man-in-the-middle techniques to retransmit previously used message exchanges between supplicant and authenticator.
The vulnerability is dubbed "KRACK" attack.
21) Use-after-free error (CVE-ID: CVE-2017-13797)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to use-after-free error in the WebKit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Remediation
Install update from vendor's website.