exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Apple Security Advisory 2016-10-24-5

Apple Security Advisory 2016-10-24-5
Posted Oct 24, 2016
Authored by Apple | Site apple.com

Apple Security Advisory 2016-10-24-5 - watchOS 3.1 is now available and addresses code execution, information disclosure, and various other vulnerabilities.

tags | advisory, vulnerability, code execution, info disclosure
systems | apple
advisories | CVE-2016-4660, CVE-2016-4664, CVE-2016-4665, CVE-2016-4669, CVE-2016-4673, CVE-2016-4675, CVE-2016-4679, CVE-2016-4680
SHA-256 | 03010c4d89859734e65a52fb3f0f18be0e1933849a9dae3b4f8573ecd3767e7a

Apple Security Advisory 2016-10-24-5

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2016-10-24-5 watchOS 3.1

watchOS 3.1 is now available and addresses the following:

CoreGraphics
Available for: All Apple Watch models
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab),
Tencent

FontParser
Available for: All Apple Watch models
Impact: Parsing a maliciously crafted font may disclose sensitive
user information
Description: An out-of-bounds read was addressed through improved
bounds checking.
CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab

Kernel
Available for: All Apple Watch models
Impact: An application may be able to disclose kernel memory
Description: A validation issue was addressed through improved input
sanitization.
CVE-2016-4680: Max Bazaliy of Lookout and in7egral

libarchive
Available for: All Apple Watch models
Impact: A malicious archive may be able to overwrite arbitrary files
Description: An issue existed within the path validation logic for
symlinks. This issue was addressed through improved path
sanitization.
CVE-2016-4679: Omer Medan of enSilo Ltd

libxpc
Available for: All Apple Watch models
Impact: An application may be able to execute arbitrary code with
root privileges
Description: A logic issue was addressed through additional
restrictions.
CVE-2016-4675: Ian Beer of Google Project Zero

Sandbox Profiles
Available for: All Apple Watch models
Impact: An application may be able to retrieve metadata of photo
directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)

Sandbox Profiles
Available for: All Apple Watch models
Impact: An application may be able to retrieve metadata of audio
recording directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)

System Boot
Available for: All Apple Watch models
Impact: A local user may be able to cause an unexpected system
termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG
generated code. These issues were addressed through improved
validation.
CVE-2016-4669: Ian Beer of Google Project Zero

Installation note:

Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641

To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".

Alternatively, on your watch, select "My Watch > General > About".

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=NsnX
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close