IOAcceleratorFamily in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
IOAcceleratorFamily in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://support.apple.com/HT207141 | x_refsource_CONFIRM |
http://www.securitytracker.com/id/1036858 | vdb-entry x_refsource_SECTRACK |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html | vendor-advisory x_refsource_APPLE |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html | vendor-advisory x_refsource_APPLE |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html | vendor-advisory x_refsource_APPLE |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html | vendor-advisory x_refsource_APPLE |
http://www.securityfocus.com/bid/93054 | vdb-entry x_refsource_BID |
https://support.apple.com/HT207170 | x_refsource_CONFIRM |
https://support.apple.com/HT207142 | x_refsource_CONFIRM |
https://support.apple.com/HT207143 | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://support.apple.com/HT207141 | x_refsource_CONFIRM x_transferred |
http://www.securitytracker.com/id/1036858 | vdb-entry x_refsource_SECTRACK x_transferred |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html | vendor-advisory x_refsource_APPLE x_transferred |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html | vendor-advisory x_refsource_APPLE x_transferred |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html | vendor-advisory x_refsource_APPLE x_transferred |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html | vendor-advisory x_refsource_APPLE x_transferred |
http://www.securityfocus.com/bid/93054 | vdb-entry x_refsource_BID x_transferred |
https://support.apple.com/HT207170 | x_refsource_CONFIRM x_transferred |
https://support.apple.com/HT207142 | x_refsource_CONFIRM x_transferred |
https://support.apple.com/HT207143 | x_refsource_CONFIRM x_transferred |
IOAcceleratorFamily in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.0 | 7.8 | HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Primary | 2.0 | 9.3 | HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Hyperlink | Source | Resource |
---|---|---|
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html | product-security@apple.com | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html | product-security@apple.com | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html | product-security@apple.com | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html | product-security@apple.com | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/93054 | product-security@apple.com | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036858 | product-security@apple.com | Third Party Advisory VDB Entry |
https://support.apple.com/HT207141 | product-security@apple.com | Vendor Advisory |
https://support.apple.com/HT207142 | product-security@apple.com | Vendor Advisory |
https://support.apple.com/HT207143 | product-security@apple.com | Vendor Advisory |
https://support.apple.com/HT207170 | product-security@apple.com | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/93054 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036858 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
https://support.apple.com/HT207141 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
https://support.apple.com/HT207142 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
https://support.apple.com/HT207143 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
https://support.apple.com/HT207170 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |