Vulnerability CVE-2017-7065


Published: 2018-04-03

Description:
An issue was discovered in certain Apple products. iOS before 10.3.3 is affected. macOS before 10.12.6 is affected. tvOS before 10.2.2 is affected. The issue involves the "Wi-Fi" component. It allows remote attackers to execute arbitrary code (on the Wi-Fi chip) or cause a denial of service (memory corruption) by leveraging proximity for 802.11.

See advisories in our WLB2 database:
Topic
Author
Date
High
Broadcom 802.11v WNM Sleep Mode Response Heap Overflow
laginimaineb
26.09.2017

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

Vendor: Apple
Product: Iphone os 
Version:
9.3.5
9.3.4
9.3.3
9.3.2
9.3.1
9.3
9.2.1
9.2
9.1
9.0.2
9.0.1
9.0
8.4.1
8.3
8.2
8.1.3
8.1.2
8.1
8.0.2
8.0.1
8.0
7.1.2
7.1.1
7.1
7.0.6
7.0.5
7.0.4
7.0.3
7.0.2
7.0.1
7.0
6.1.6
6.1.5
6.1.4
6.1.3
6.1.2
6.1
6.0.2
6.0.1
6.0
5.1.1
5.1
5.0.1
5.0
4.3.5
4.3.3
4.3.2
See more versions on NVD
Product: TVOS 
Version:
9.2.2
9.2.1
9.2
9.1.1
9.1
9.0.1
9.0
7.1
7.0.3
7.0.1
7.0
6.2.1
6.2
6.1.2
6.1.1
6.1
6.0.2
6.0.1
6.0
5.2.0
5.1.1
5.1.0
5.0.2
5.0.1
5.0.0
4.4.4
4.4.3
4.4.2
4.4.0
See more versions on NVD
Product: Apple tv 
Version:
9.1.1
9.0.1
7.1
7.0.3
7.0.1
7.0
6.2.1
6.2
6.1.2
6.1.1
6.1
6.0.2
6.0.1
6.0
5.2.0
5.1.1
5.1.0
5.0.2
5.0.1
5.0.0
4.4.4
4.4.3
4.4.2
4.4.0
See more versions on NVD

CVSS2 => (AV:A/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
6.4/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://www.securityfocus.com/bid/100655
https://support.apple.com/HT207922
https://support.apple.com/HT207923
https://support.apple.com/HT207924

Related CVE
CVE-2019-9536
Apple iPhone 3GS bootrom malloc implementation returns a non-NULL pointer when unable to allocate memory, aka 'alloc8'. An attacker with physical access to the device can install arbitrary firmware.
CVE-2019-9506
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") tha...
CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONT...
CVE-2019-9517
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so...
CVE-2019-9516
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater h...
CVE-2019-9515
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS f...
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the p...
CVE-2019-9513
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the...

Copyright 2019, cxsecurity.com

 

Back to Top