var-201702-0208
Vulnerability from variot
An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the "AppleGraphicsPowerManagement" component. It allows local users to cause a denial of service (NULL pointer dereference) via unspecified vectors. This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of the AppleGraphicsPowerManagement kext. The issue lies in the absence of a check to ensure that a pointer is not null. An attacker can leverage this vulnerability to escalate privileges under the context of the kernel. Apple macOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code, perform unauthorized actions, obtain sensitive information, gain elevated privileges or cause a denial-of-service condition. AppleGraphicsPowerManagement is one of the graphics card power management components. Attackers can exploit this vulnerability to cause system denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0208", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 1.4, "vendor": "apple", "version": "10.12.1" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.12.1" }, { "model": "os x", "scope": null, "trust": 0.7, "vendor": "apple", "version": null }, { "model": "macos", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.12.1" }, { "model": "macos", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "10.12.2" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-642" }, { "db": "BID", "id": "94903" }, { "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "db": "CNNVD", "id": "CNNVD-201612-486" }, { "db": "NVD", "id": "CVE-2016-7609" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007393" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "daybreaker@Minionz", "sources": [ { "db": "ZDI", "id": "ZDI-16-642" } ], "trust": 0.7 }, "cve": "CVE-2016-7609", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2016-7609", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "ZDI", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2016-7609", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.7, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-96429", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.5, "id": "CVE-2016-7609", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2016-7609", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2016-7609", "trust": 0.8, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2016-7609", "trust": 0.7, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201612-486", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-96429", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-642" }, { "db": "VULHUB", "id": "VHN-96429" }, { "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "db": "CNNVD", "id": "CNNVD-201612-486" }, { "db": "NVD", "id": "CVE-2016-7609" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in certain Apple products. macOS before 10.12.2 is affected. The issue involves the \"AppleGraphicsPowerManagement\" component. It allows local users to cause a denial of service (NULL pointer dereference) via unspecified vectors. This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Apple OS X. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of the AppleGraphicsPowerManagement kext. The issue lies in the absence of a check to ensure that a pointer is not null. An attacker can leverage this vulnerability to escalate privileges under the context of the kernel. Apple macOS is prone to multiple security vulnerabilities. \nAttackers can exploit these issues to execute arbitrary code, perform unauthorized actions, obtain sensitive information, gain elevated privileges or cause a denial-of-service condition. AppleGraphicsPowerManagement is one of the graphics card power management components. Attackers can exploit this vulnerability to cause system denial of service", "sources": [ { "db": "NVD", "id": "CVE-2016-7609" }, { "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "db": "ZDI", "id": "ZDI-16-642" }, { "db": "BID", "id": "94903" }, { "db": "VULHUB", "id": "VHN-96429" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2016-7609", "trust": 3.5 }, { "db": "BID", "id": "94903", "trust": 2.0 }, { "db": "SECTRACK", "id": "1037469", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU97133642", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2016-007393", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-3864", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-16-642", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201612-486", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-96429", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-642" }, { "db": "VULHUB", "id": "VHN-96429" }, { "db": "BID", "id": "94903" }, { "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "db": "CNNVD", "id": "CNNVD-201612-486" }, { "db": "NVD", "id": "CVE-2016-7609" } ] }, "id": "VAR-201702-0208", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-96429" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:39:30.668000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT207423", "trust": 1.5, "url": "https://support.apple.com/en-us/HT207423" }, { "title": "Apple security updates", "trust": 0.8, "url": "https://support.apple.com/en-us/HT201222" }, { "title": "APPLE-SA-2016-12-13-1 macOS 10.12.2", "trust": 0.8, "url": "https://lists.apple.com/archives/security-announce/2016/Dec/msg00003.html" }, { "title": "HT207423", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT207423" }, { "title": "Apple macOS Sierra Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66520" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-642" }, { "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "db": "CNNVD", "id": "CNNVD-201612-486" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-96429" }, { "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "db": "NVD", "id": "CVE-2016-7609" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/94903" }, { "trust": 1.7, "url": "https://support.apple.com/ht207423" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037469" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7609" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu97133642/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-7609" }, { "trust": 0.7, "url": "https://support.apple.com/en-us/ht207423" }, { "trust": 0.3, "url": "https://www.apple.com/" }, { "trust": 0.3, "url": "http://www.apple.com/macosx/" } ], "sources": [ { "db": "ZDI", "id": "ZDI-16-642" }, { "db": "VULHUB", "id": "VHN-96429" }, { "db": "BID", "id": "94903" }, { "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "db": "CNNVD", "id": "CNNVD-201612-486" }, { "db": "NVD", "id": "CVE-2016-7609" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-16-642" }, { "db": "VULHUB", "id": "VHN-96429" }, { "db": "BID", "id": "94903" }, { "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "db": "CNNVD", "id": "CNNVD-201612-486" }, { "db": "NVD", "id": "CVE-2016-7609" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-642" }, { "date": "2017-02-20T00:00:00", "db": "VULHUB", "id": "VHN-96429" }, { "date": "2016-12-13T00:00:00", "db": "BID", "id": "94903" }, { "date": "2017-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "date": "2016-12-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-486" }, { "date": "2017-02-20T08:59:02.417000", "db": "NVD", "id": "CVE-2016-7609" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-15T00:00:00", "db": "ZDI", "id": "ZDI-16-642" }, { "date": "2017-07-27T00:00:00", "db": "VULHUB", "id": "VHN-96429" }, { "date": "2016-12-20T00:09:00", "db": "BID", "id": "94903" }, { "date": "2017-02-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2016-007393" }, { "date": "2017-03-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201612-486" }, { "date": "2024-11-21T02:58:17.767000", "db": "NVD", "id": "CVE-2016-7609" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-486" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple macOS of AppleGraphicsPowerManagement Denial of service in component (DoS) Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2016-007393" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201612-486" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.