7.8
CVSSv3

CVE-2016-7644

Published: 20/02/2017 Updated: 30/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 935
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

An issue exists in certain Apple products. iOS prior to 10.2 is affected. macOS prior to 10.12.2 is affected. watchOS prior to 3.1.3 is affected. The issue involves the "Kernel" component. It allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple iphone os

apple mac os x

apple watchos

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=965 set_dp_control_port is a MIG method on the host_priv_port so this bug is a root->kernel escalation kern_return_t set_dp_control_port( host_priv_t host_priv, ipc_port_t control_port) { if (host_priv == HOST_PRIV_NULL) return (KERN_ ...

Github Repositories

https://bugs.chromium.org/p/project-zero/issues/detail?id=965#c2

SOURCE /* ianbeer */ READ THIS FIRST: if you do not have an iPod touch 6g running 1011 (14b100) or and iPad mini 2 running 1011 (14b100) this project will not work out of the box(*)! You need to fix up a couple of offsets - see the section futher down Adding support for other devices (*) more precisely, I only have those devices and have only tested it on them (*) 1b4150 w