var-201602-0205
Vulnerability from variot
The IOAcceleratorFamily2 interface in IOAcceleratorFamily in Apple OS X before 10.11.3 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. User interaction is required to exploit this vulnerability in that the target must open a malicious file.The specific flaw exists within the IOAcceleratorFamily2 interface. The issue lies in the failure to properly test a user-supplied index to ensure it is within the bounds of an array. An attacker can leverage this to escalate their privileges and execute code under the context of the kernel. Apple Mac OS X is prone to multiple privilege-escalation vulnerabilities. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2016-01-19-2 OS X El Capitan 10.11.3 and Security Update 2016-001
OS X El Capitan 10.11.3 and Security Update 2016-001 is now available and addresses the following:
AppleGraphicsPowerManagement Available for: OS X El Capitan v10.11 to v10.11.2 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1716 : moony li of Trend Micro and Liang Chen and Sen Nie of KeenLab, Tencent
Disk Images Available for: OS X El Capitan v10.11 to v10.11.2 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling. CVE-ID CVE-2016-1717 : Frank Graziano of Yahoo! Pentest Team
IOAcceleratorFamily Available for: OS X El Capitan v10.11.0 to v10.11.2 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1718 : Juwei Lin Trend Micro working with HP's Zero Day Initiative
IOHIDFamily Available for: OS X El Capitan v10.11 to v10.11.2 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue existed in an IOHIDFamily API. This issue was addressed through improved memory handling. CVE-ID CVE-2016-1719 : Ian Beer of Google Project Zero
IOKit Available for: OS X El Capitan v10.11 to v10.11.2 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1720 : Ian Beer of Google Project Zero
Kernel Available for: OS X El Capitan v10.11 to v10.11.2 Impact: A local user may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1721 : Ian Beer of Google Project Zero and Ju Zhu of Trend Micro
libxslt Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 to v10.11.2 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: A type confusion issue existed in libxslt. This issue was addressed through improved memory handling. CVE-ID CVE-2015-7995 : puzzor
OSA Scripts Available for: OS X El Capitan v10.11 to v10.11.2 Impact: A quarantined application may be able to override OSA script libraries installed by the user Description: An issue existed when searching for scripting libraries. This issue was addressed through improved search order and quarantine checks. CVE-ID CVE-2016-1729 : an anonymous researcher
syslog Available for: OS X El Capitan v10.11 to v10.11.2 Impact: A local user may be able to execute arbitrary code with root privileges Description: A memory corruption issue was addressed through improved memory handling. CVE-ID CVE-2016-1722 : Joshua J. Drake and Nikias Bassen of Zimperium zLabs
-----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJWnsHdAAoJEBcWfLTuOo7tj/0P/2uG1QyMoIxPwzrtA178gig5 G1ozPA98X+6X+wd2ocVDUjROhKB+nySUuQvMr/LZY1ZyOE+zZlyv60EYefSwX9Qn ASQfdHU73eu1cfViQOrACb5CvyCv8xQ3xEs5Z8Ruw4AaLKM5ICSaFRZKPb6VLVJ8 S4l5fYY+su5LBqM61AxQi9WlHNsy0IUARj1dz67/Q45eJat9gkzUX5Xwuya5KbMu At2nyrzJQZhPmCl4uARglipbRE4r/jVC0Hmq8pM6rjRusO80cx6HsbUm0jIKe/xu QRN5IMrhyp4YnYwujFIN7sknsAQYdGjoq250KFe9lWeq4HhA+JI3pqCRfPY0uqo4 tL9TBmusv6xw5WgjomobCV8hEq3zmPwNyfBDgAot/mdUMOuam3qpyEeWpSATgfUj esgWZTPR5AAGd/dxk82Kz7PoHLDKf7lTtBbE8MRYFGaVZVZUiOjjbusYWbbikkhH Tr1Hy0kCJ3YLWpO/6G6z5sZXdXKTMf/o/PqnoRAwxXIr6PnfcPdpf0N+/cdQaqmv aoPNKPrCGAu3vlBHFrpP4FJgR6piZW/X30hh4DzqpGVNulUEI9USyIYsjB4M5IN7 pYUclIqpiLfXwi02uleVaetDuyPRCTY0vKOpMYVXG838aqZzpXyDRzyiPwLDMbK9 bb0aaqIVGEjM+xgCQ1db =CR2n -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201602-0205", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.11.2" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.11.0 to v10.11.2" }, { "model": "os x", "scope": null, "trust": 0.7, "vendor": "apple", "version": null }, { "model": "mac os x", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.11.2" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-020" }, { "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "db": "CNNVD", "id": "CNNVD-201601-616" }, { "db": "NVD", "id": "CVE-2016-1718" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001401" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juwei Lin - Trend Micro", "sources": [ { "db": "ZDI", "id": "ZDI-16-020" }, { "db": "CNNVD", "id": "CNNVD-201601-616" } ], "trust": 1.3 }, "cve": "CVE-2016-1718", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2016-1718", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 2.5, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-90537", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.3, "id": "CVE-2016-1718", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-1718", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2016-1718", "trust": 0.8, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2016-1718", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201601-616", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-90537", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-020" }, { "db": "VULHUB", "id": "VHN-90537" }, { "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "db": "CNNVD", "id": "CNNVD-201601-616" }, { "db": "NVD", "id": "CVE-2016-1718" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The IOAcceleratorFamily2 interface in IOAcceleratorFamily in Apple OS X before 10.11.3 allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors. User interaction is required to exploit this vulnerability in that the target must open a malicious file.The specific flaw exists within the IOAcceleratorFamily2 interface. The issue lies in the failure to properly test a user-supplied index to ensure it is within the bounds of an array. An attacker can leverage this to escalate their privileges and execute code under the context of the kernel. Apple Mac OS X is prone to multiple privilege-escalation vulnerabilities. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2016-01-19-2 OS X El Capitan 10.11.3 and Security Update \n2016-001\n\nOS X El Capitan 10.11.3 and Security Update 2016-001 is now available\nand addresses the following:\n\nAppleGraphicsPowerManagement\nAvailable for: OS X El Capitan v10.11 to v10.11.2\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1716 : moony li of Trend Micro and Liang Chen and Sen Nie of\nKeenLab, Tencent\n\nDisk Images\nAvailable for: OS X El Capitan v10.11 to v10.11.2\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in the parsing of\ndisk images. This issue was addressed through improved memory\nhandling. \nCVE-ID\nCVE-2016-1717 : Frank Graziano of Yahoo! Pentest Team\n\nIOAcceleratorFamily\nAvailable for: OS X El Capitan v10.11.0 to v10.11.2\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1718 : Juwei Lin Trend Micro working with HP\u0027s Zero Day\nInitiative\n\nIOHIDFamily\nAvailable for: OS X El Capitan v10.11 to v10.11.2\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue existed in an IOHIDFamily\nAPI. This issue was addressed through improved memory handling. \nCVE-ID\nCVE-2016-1719 : Ian Beer of Google Project Zero\n\nIOKit\nAvailable for: OS X El Capitan v10.11 to v10.11.2\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1720 : Ian Beer of Google Project Zero\n\nKernel\nAvailable for: OS X El Capitan v10.11 to v10.11.2\nImpact: A local user may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1721 : Ian Beer of Google Project Zero and Ju Zhu of Trend\nMicro\n\nlibxslt\nAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,\nand OS X El Capitan v10.11 to v10.11.2\nImpact: Visiting a maliciously crafted website may lead to arbitrary\ncode execution\nDescription: A type confusion issue existed in libxslt. This issue\nwas addressed through improved memory handling. \nCVE-ID\nCVE-2015-7995 : puzzor\n\nOSA Scripts\nAvailable for: OS X El Capitan v10.11 to v10.11.2\nImpact: A quarantined application may be able to override OSA script\nlibraries installed by the user\nDescription: An issue existed when searching for scripting\nlibraries. This issue was addressed through improved search order and\nquarantine checks. \nCVE-ID\nCVE-2016-1729 : an anonymous researcher\n\nsyslog\nAvailable for: OS X El Capitan v10.11 to v10.11.2\nImpact: A local user may be able to execute arbitrary code with root\nprivileges\nDescription: A memory corruption issue was addressed through\nimproved memory handling. \nCVE-ID\nCVE-2016-1722 : Joshua J. Drake and Nikias Bassen of Zimperium zLabs\n\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n\niQIcBAEBCgAGBQJWnsHdAAoJEBcWfLTuOo7tj/0P/2uG1QyMoIxPwzrtA178gig5\nG1ozPA98X+6X+wd2ocVDUjROhKB+nySUuQvMr/LZY1ZyOE+zZlyv60EYefSwX9Qn\nASQfdHU73eu1cfViQOrACb5CvyCv8xQ3xEs5Z8Ruw4AaLKM5ICSaFRZKPb6VLVJ8\nS4l5fYY+su5LBqM61AxQi9WlHNsy0IUARj1dz67/Q45eJat9gkzUX5Xwuya5KbMu\nAt2nyrzJQZhPmCl4uARglipbRE4r/jVC0Hmq8pM6rjRusO80cx6HsbUm0jIKe/xu\nQRN5IMrhyp4YnYwujFIN7sknsAQYdGjoq250KFe9lWeq4HhA+JI3pqCRfPY0uqo4\ntL9TBmusv6xw5WgjomobCV8hEq3zmPwNyfBDgAot/mdUMOuam3qpyEeWpSATgfUj\nesgWZTPR5AAGd/dxk82Kz7PoHLDKf7lTtBbE8MRYFGaVZVZUiOjjbusYWbbikkhH\nTr1Hy0kCJ3YLWpO/6G6z5sZXdXKTMf/o/PqnoRAwxXIr6PnfcPdpf0N+/cdQaqmv\naoPNKPrCGAu3vlBHFrpP4FJgR6piZW/X30hh4DzqpGVNulUEI9USyIYsjB4M5IN7\npYUclIqpiLfXwi02uleVaetDuyPRCTY0vKOpMYVXG838aqZzpXyDRzyiPwLDMbK9\nbb0aaqIVGEjM+xgCQ1db\n=CR2n\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2016-1718" }, { "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "db": "ZDI", "id": "ZDI-16-020" }, { "db": "BID", "id": "81274" }, { "db": "VULHUB", "id": "VHN-90537" }, { "db": "PACKETSTORM", "id": "135326" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-1718", "trust": 3.6 }, { "db": "ZDI", "id": "ZDI-16-020", "trust": 2.4 }, { "db": "SECTRACK", "id": "1034736", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU90405245", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-001401", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3316", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201601-616", "trust": 0.7 }, { "db": "BID", "id": "81274", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-90537", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "135326", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-020" }, { "db": "VULHUB", "id": "VHN-90537" }, { "db": "BID", "id": "81274" }, { "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "db": "PACKETSTORM", "id": "135326" }, { "db": "CNNVD", "id": "CNNVD-201601-616" }, { "db": "NVD", "id": "CVE-2016-1718" } ] }, "id": "VAR-201602-0205", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-90537" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:10:18.146000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT205731", "trust": 1.5, "url": "https://support.apple.com/en-us/HT205731" }, { "title": "Apple security updates", "trust": 0.8, "url": "https://support.apple.com/en-us/HT201222" }, { "title": "APPLE-SA-2016-01-19-2 OS X El Capitan 10.11.3 and Security Update 2016-001", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2016/Jan/msg00003.html" }, { "title": "HT205731", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT205731" }, { "title": "Apple OS X IOAcceleratorFamily2 Repairs for interface permissions and access control vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=59934" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-020" }, { "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "db": "CNNVD", "id": "CNNVD-201601-616" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-90537" }, { "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "db": "NVD", "id": "CVE-2016-1718" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2016/jan/msg00003.html" }, { "trust": 1.7, "url": "https://support.apple.com/ht205731" }, { "trust": 1.7, "url": "http://zerodayinitiative.com/advisories/zdi-16-020/" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034736" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1718" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu90405245/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1718" }, { "trust": 0.7, "url": "https://support.apple.com/en-us/ht205731" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1720" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-7995" }, { "trust": 0.1, "url": "https://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1719" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1721" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1718" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1722" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1729" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1716" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-1717" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-020" }, { "db": "VULHUB", "id": "VHN-90537" }, { "db": "BID", "id": "81274" }, { "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "db": "PACKETSTORM", "id": "135326" }, { "db": "CNNVD", "id": "CNNVD-201601-616" }, { "db": "NVD", "id": "CVE-2016-1718" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-16-020" }, { "db": "VULHUB", "id": "VHN-90537" }, { "db": "BID", "id": "81274" }, { "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "db": "PACKETSTORM", "id": "135326" }, { "db": "CNNVD", "id": "CNNVD-201601-616" }, { "db": "NVD", "id": "CVE-2016-1718" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-22T00:00:00", "db": "ZDI", "id": "ZDI-16-020" }, { "date": "2016-02-01T00:00:00", "db": "VULHUB", "id": "VHN-90537" }, { "date": "2016-01-19T00:00:00", "db": "BID", "id": "81274" }, { "date": "2016-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "date": "2016-01-20T16:54:51", "db": "PACKETSTORM", "id": "135326" }, { "date": "2016-01-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-616" }, { "date": "2016-02-01T11:59:02.183000", "db": "NVD", "id": "CVE-2016-1718" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-01-22T00:00:00", "db": "ZDI", "id": "ZDI-16-020" }, { "date": "2017-09-10T00:00:00", "db": "VULHUB", "id": "VHN-90537" }, { "date": "2016-02-11T07:41:00", "db": "BID", "id": "81274" }, { "date": "2016-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-001401" }, { "date": "2016-02-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201601-616" }, { "date": "2024-11-21T02:46:57.173000", "db": "NVD", "id": "CVE-2016-1718" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-616" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple OS X of IOAcceleratorFamily of IOAcceleratorFamily2 Vulnerability that can get permission in the interface", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-001401" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201601-616" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.