731
VMScore

CVE-2016-7637

Published: 20/02/2017 Updated: 30/10/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 731
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in certain Apple products. iOS prior to 10.2 is affected. macOS prior to 10.12.2 is affected. watchOS prior to 3.1.3 is affected. The issue involves the "Kernel" component. It allows local users to gain privileges or cause a denial of service (memory corruption) via unspecified vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple iphone os

apple mac os x

apple watchos

Exploits

/* Source: bugschromiumorg/p/project-zero/issues/detail?id=959 Proofs of Concept: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40957zip When sending and receiving mach messages from userspace there are two important kernel objects; ipc_entry and ipc_object ipc_entry's are the per-process handles ...
Source: bugschromiumorg/p/project-zero/issues/detail?id=965 set_dp_control_port is a MIG method on the host_priv_port so this bug is a root->kernel escalation kern_return_t set_dp_control_port( host_priv_t host_priv, ipc_port_t control_port) { if (host_priv == HOST_PRIV_NULL) return (KERN_ ...

Github Repositories

https://bugs.chromium.org/p/project-zero/issues/detail?id=965#c2

SOURCE /* ianbeer */ READ THIS FIRST: if you do not have an iPod touch 6g running 1011 (14b100) or and iPad mini 2 running 1011 (14b100) this project will not work out of the box(*)! You need to fix up a couple of offsets - see the section futher down Adding support for other devices (*) more precisely, I only have those devices and have only tested it on them (*) 1b4150 w

CVE-2018-4280: Mach port replacement vulnerability in launchd on macOS 10.13.5 leading to local privilege escalation and SIP bypass.

launchd-portrep launchd-portrep is an exploit for a port replacement vulnerability in launchd, the initial userspace process and service management daemon on macOS By sending a crafted Mach message to the bootstrap port, launchd can be coerced into deallocating its send right for any Mach port to which the attacker also has a send right This allows the attacker to impersonat

iOS 10 exploit, based on CVE-2016-7637/7644/7661 @ianbeer bugschromiumorg/p/project-zero/issues/detail?id=965 All offsets by reddit community (@Mila432) Added HTTP webserver (@geekornotgeek) Added File browser Run project, wait until debug says the webserver (also the shell) is ready Browse: 127001:8081 on your device (or (iphone-ip):8081) on o