CERTFR-2016-AVI-411
Vulnerability from certfr_avis

De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Apple macOS Apple macOS Sierra versions antérieures à 10.12.2
Apple Safari Apple Safari versions antérieures à 10.0.2
Apple N/A Apple iCloud pour Windows versions antérieures à 6.1
Apple N/A Apple iTunes pour Windows versions antérieures à 12.5.4

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Apple macOS Sierra versions ant\u00e9rieures \u00e0 10.12.2",
      "product": {
        "name": "macOS",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Apple Safari versions ant\u00e9rieures \u00e0 10.0.2",
      "product": {
        "name": "Safari",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Apple iCloud pour Windows versions ant\u00e9rieures \u00e0 6.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    },
    {
      "description": "Apple iTunes pour Windows versions ant\u00e9rieures \u00e0 12.5.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Apple",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2016-8615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8615"
    },
    {
      "name": "CVE-2016-7646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7646"
    },
    {
      "name": "CVE-2016-7615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7615"
    },
    {
      "name": "CVE-2016-7411",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7411"
    },
    {
      "name": "CVE-2016-7643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7643"
    },
    {
      "name": "CVE-2016-7624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7624"
    },
    {
      "name": "CVE-2016-7589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7589"
    },
    {
      "name": "CVE-2016-8619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8619"
    },
    {
      "name": "CVE-2016-7645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7645"
    },
    {
      "name": "CVE-2016-7650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7650"
    },
    {
      "name": "CVE-2016-7591",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7591"
    },
    {
      "name": "CVE-2016-7629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7629"
    },
    {
      "name": "CVE-2016-7637",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7637"
    },
    {
      "name": "CVE-2016-7649",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7649"
    },
    {
      "name": "CVE-2016-4688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4688"
    },
    {
      "name": "CVE-2016-7640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7640"
    },
    {
      "name": "CVE-2016-8624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8624"
    },
    {
      "name": "CVE-2016-7620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7620"
    },
    {
      "name": "CVE-2016-7587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7587"
    },
    {
      "name": "CVE-2016-7616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7616"
    },
    {
      "name": "CVE-2016-8616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8616"
    },
    {
      "name": "CVE-2016-7659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7659"
    },
    {
      "name": "CVE-2016-8620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8620"
    },
    {
      "name": "CVE-2016-7663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7663"
    },
    {
      "name": "CVE-2016-7648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7648"
    },
    {
      "name": "CVE-2016-6303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-6303"
    },
    {
      "name": "CVE-2016-7595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7595"
    },
    {
      "name": "CVE-2016-7657",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7657"
    },
    {
      "name": "CVE-2016-7639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7639"
    },
    {
      "name": "CVE-2016-7610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7610"
    },
    {
      "name": "CVE-2016-7605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7605"
    },
    {
      "name": "CVE-2016-7588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7588"
    },
    {
      "name": "CVE-2016-7636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7636"
    },
    {
      "name": "CVE-2016-7602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7602"
    },
    {
      "name": "CVE-2016-8617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8617"
    },
    {
      "name": "CVE-2016-7652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7652"
    },
    {
      "name": "CVE-2016-7641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7641"
    },
    {
      "name": "CVE-2016-7642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7642"
    },
    {
      "name": "CVE-2016-6304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-6304"
    },
    {
      "name": "CVE-2016-8618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8618"
    },
    {
      "name": "CVE-2016-7608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7608"
    },
    {
      "name": "CVE-2016-4743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4743"
    },
    {
      "name": "CVE-2016-5419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-5419"
    },
    {
      "name": "CVE-2016-7621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7621"
    },
    {
      "name": "CVE-2016-8623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8623"
    },
    {
      "name": "CVE-2016-7606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7606"
    },
    {
      "name": "CVE-2016-7418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7418"
    },
    {
      "name": "CVE-2016-7614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7614"
    },
    {
      "name": "CVE-2016-7596",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7596"
    },
    {
      "name": "CVE-2016-4691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4691"
    },
    {
      "name": "CVE-2016-4692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4692"
    },
    {
      "name": "CVE-2016-7592",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7592"
    },
    {
      "name": "CVE-2016-7604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7604"
    },
    {
      "name": "CVE-2016-7586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7586"
    },
    {
      "name": "CVE-2016-7167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7167"
    },
    {
      "name": "CVE-2016-7654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7654"
    },
    {
      "name": "CVE-2016-5420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-5420"
    },
    {
      "name": "CVE-2016-7141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7141"
    },
    {
      "name": "CVE-2016-7609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7609"
    },
    {
      "name": "CVE-2016-7611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7611"
    },
    {
      "name": "CVE-2016-7416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7416"
    },
    {
      "name": "CVE-2016-8621",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8621"
    },
    {
      "name": "CVE-2016-7635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7635"
    },
    {
      "name": "CVE-2016-7599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7599"
    },
    {
      "name": "CVE-2016-4693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-4693"
    },
    {
      "name": "CVE-2016-7633",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7633"
    },
    {
      "name": "CVE-2016-7658",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7658"
    },
    {
      "name": "CVE-2016-7417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7417"
    },
    {
      "name": "CVE-2016-7662",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7662"
    },
    {
      "name": "CVE-2016-7660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7660"
    },
    {
      "name": "CVE-2016-7612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7612"
    },
    {
      "name": "CVE-2016-7414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7414"
    },
    {
      "name": "CVE-2016-7625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7625"
    },
    {
      "name": "CVE-2016-7644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7644"
    },
    {
      "name": "CVE-2016-1777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1777"
    },
    {
      "name": "CVE-2016-1823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-1823"
    },
    {
      "name": "CVE-2016-7412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7412"
    },
    {
      "name": "CVE-2016-7627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7627"
    },
    {
      "name": "CVE-2016-7632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7632"
    },
    {
      "name": "CVE-2016-7661",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7661"
    },
    {
      "name": "CVE-2016-7607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7607"
    },
    {
      "name": "CVE-2016-7655",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7655"
    },
    {
      "name": "CVE-2016-7594",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7594"
    },
    {
      "name": "CVE-2016-7598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7598"
    },
    {
      "name": "CVE-2016-7622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7622"
    },
    {
      "name": "CVE-2016-7656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7656"
    },
    {
      "name": "CVE-2016-8622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8622"
    },
    {
      "name": "CVE-2016-7617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7617"
    },
    {
      "name": "CVE-2016-7619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7619"
    },
    {
      "name": "CVE-2016-7600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7600"
    },
    {
      "name": "CVE-2016-5421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-5421"
    },
    {
      "name": "CVE-2016-7603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7603"
    },
    {
      "name": "CVE-2016-7618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7618"
    },
    {
      "name": "CVE-2016-7413",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7413"
    },
    {
      "name": "CVE-2016-7628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-7628"
    },
    {
      "name": "CVE-2016-8625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-8625"
    }
  ],
  "initial_release_date": "2016-12-14T00:00:00",
  "last_revision_date": "2016-12-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2016-AVI-411",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2016-12-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Injection de code indirecte \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    },
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207424 du 13 d\u00e9cembre 2016",
      "url": "https://support.apple.com/en-us/HT207424"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207421 du 13 d\u00e9cembre 2016",
      "url": "https://support.apple.com/en-us/HT207421"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207427 du 13 d\u00e9cembre 2016",
      "url": "https://support.apple.com/en-us/HT207427"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207423 du 13 d\u00e9cembre 2016",
      "url": "https://support.apple.com/en-us/HT207423"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…