ID

VAR-201709-0464


CVE

CVE-2017-14315


TITLE

Multiple Bluetooth implementation vulnerabilities affect many devices

Trust: 0.8

sources: CERT/CC: VU#240311

DESCRIPTION

In Apple iOS 7 through 9, due to a BlueBorne flaw in the implementation of LEAP (Low Energy Audio Protocol), a large audio command can be sent to a targeted device and lead to a heap overflow with attacker-controlled data. Since the audio commands sent via LEAP are not properly validated, an attacker can use this overflow to gain full control of the device through the relatively high privileges of the Bluetooth stack in iOS. The attack bypasses Bluetooth access control; however, the default "Bluetooth On" value must be present in Settings. A collection of Bluetooth implementation vulnerabilities known as "BlueBorne" has been released. These vulnerabilities collectively affect Windows, iOS, and Linux-kernel-based operating systems including Android and Tizen, and may in worst case allow an unauthenticated attacker to perform commands on the device. Apple iOS and tvOS are prone to a heap-based buffer-overflow vulnerability. An attacker can exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will likely result in denial of service conditions. Following products and versions are vulnerable: Apple iOS 7 through 9.3.5 Apple tvOS. The vulnerability stems from the fact that the program does not correctly verify audio commands. An attacker could exploit this vulnerability to take control of the device. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2019-5-13-5 Safari 12.1.1 Safari 12.1.1 is now available and addresses the following: WebKit Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and included in macOS Mojave 10.14.5 Impact: Processing maliciously crafted web content may result in the disclosure of process memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8607: Junho Jang and Hanul Choi of LINE Security Team WebKit Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and included in macOS Mojave 10.14.5 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2019-6237: G. Geshev working with Trend Micro Zero Day Initiative, Liu Long of Qihoo 360 Vulcan Team CVE-2019-8571: 01 working with Trend Micro's Zero Day Initiative CVE-2019-8583: sakura of Tencent Xuanwu Lab, jessica (@babyjess1ca_) of Tencent Keen Lab, and dwfault working at ADLab of Venustech CVE-2019-8584: G. Geshev of MWR Labs working with Trend Micro Zero Day Initiative CVE-2019-8586: an anonymous researcher CVE-2019-8587: G. Geshev working with Trend Micro Zero Day Initiative CVE-2019-8594: Suyoung Lee and Sooel Son of KAIST Web Security & Privacy Lab and HyungSeok Han and Sang Kil Cha of KAIST SoftSec Lab CVE-2019-8595: G. Geshev from MWR Labs working with Trend Micro Zero Day Initiative CVE-2019-8596: Wen Xu of SSLab at Georgia Tech CVE-2019-8597: 01 working with Trend Micro Zero Day Initiative CVE-2019-8601: Fluoroacetate working with Trend Micro's Zero Day Initiative CVE-2019-8608: G. Geshev working with Trend Micro Zero Day Initiative CVE-2019-8609: Wen Xu of SSLab, Georgia Tech CVE-2019-8610: Anonymous working with Trend Micro Zero Day Initiative CVE-2019-8611: Samuel Groß of Google Project Zero CVE-2019-8615: G. Geshev from MWR Labs working with Trend Micro's Zero Day Initiative CVE-2019-8619: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of Chaitin Security Research Lab CVE-2019-8622: Samuel Groß of Google Project Zero CVE-2019-8623: Samuel Groß of Google Project Zero CVE-2019-8628: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of Chaitin Security Research Lab Additional recognition Safari We would like to acknowledge Michael Ball of Gradescope by Turnitin for their assistance. Installation note: Safari 12.1.1 may be obtained from the Mac App Store. Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlzZrUkpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3EGGBAA jan3x6GxZzcawJskOhoEVDuZTcb19c+K9Q+jHPbG6szt2ChRkpZfN2fX+fqG8q7Y Itu63uFCfhWMKRbQrwIvzBceEUsNCbgiKNrIJGtEJkmvZjp84ETTjp5WYjMGCTCI 8pe/ij5TtFwJWWXKboO3rVfxfFcfI/67g/wx05l3h2YFoC9Fm52isUkycaAi0siP M4/nTeoA5BTAuv+7J6ohw5TgcYR8NEENpaVTQcUIMLyO3E/wlRcEoHLRtHnMjR89 CGwZg1/LIF/Ae3hJmg5O9PQMIDU6u8ILi/BVK4LGZ4u3x8Qfvg7fm556J6wBEUuP YZ2Mne5Gg1ayUGw/glTbpAkP1XFymvPloyC6/41r3b46X/nExXER86RC2uNJNNe3 8doCYGznFWWbsGBAAVrWut0sS80nOyjSpoAifkkhqZEXbo8pyvjqfGVGijwzcKcd iTdzhpcYahJ1WUIAIXbxjFlHJ8muFxyKrEuqrjnXqM+EjyYP/tu8VOCl2blTOGLP vPmF6ZBHoP3Dtqk9Z+XNusJFGWo7Nm+HLzXTyQsdbnGu8EnP6ywLHBrmBVu03men Os4rHHH1zueO42iPnATC60y9jvyFt2ofnQHCkPl7FdWS8Ek9nVgIhtzaLokrSQM7 TZ10USIZOmz/2BQs133z+fA30SgDUNDyMIE47x6x3HI= =bWtO -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/

Trust: 2.88

sources: NVD: CVE-2017-14315 // CERT/CC: VU#240311 // JVNDB: JVNDB-2017-007675 // BID: 100816 // VULHUB: VHN-105025 // VULMON: CVE-2017-14315 // PACKETSTORM: 152848

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:9.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:9.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:9.3.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:9.2.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:9.3

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:9.3.3

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:9.3.4

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:9.3.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:9.3.5

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:9.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:8.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:8.1.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:8.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:8.4.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:9.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:8.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:9.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.6

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:8.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:8.1.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.4

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:8.2

Trust: 1.0

vendor:android open sourcemodel: - scope: - version: -

Trust: 0.8

vendor:applemodel: - scope: - version: -

Trust: 0.8

vendor:blackberrymodel: - scope: - version: -

Trust: 0.8

vendor:googlemodel: - scope: - version: -

Trust: 0.8

vendor:lenovomodel: - scope: - version: -

Trust: 0.8

vendor:microsoftmodel: - scope: - version: -

Trust: 0.8

vendor:samsung mobilemodel: - scope: - version: -

Trust: 0.8

vendor:tizenmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:iosscope:eqversion:7 to 9

Trust: 0.8

vendor:necmodel:systemdirector enterprisescope: - version: -

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7

Trust: 0.3

sources: CERT/CC: VU#240311 // BID: 100816 // JVNDB: JVNDB-2017-007675 // CNNVD: CNNVD-201709-487 // NVD: CVE-2017-14315

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-14315
value: HIGH

Trust: 1.0

NVD: CVE-2017-14315
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201709-487
value: HIGH

Trust: 0.6

VULHUB: VHN-105025
value: HIGH

Trust: 0.1

VULMON: CVE-2017-14315
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-14315
severity: HIGH
baseScore: 7.9
vectorString: AV:A/AC:M/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-105025
severity: HIGH
baseScore: 7.9
vectorString: AV:A/AC:M/AU:N/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-14315
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-105025 // VULMON: CVE-2017-14315 // JVNDB: JVNDB-2017-007675 // CNNVD: CNNVD-201709-487 // NVD: CVE-2017-14315

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-105025 // JVNDB: JVNDB-2017-007675 // NVD: CVE-2017-14315

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201709-487

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201709-487

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007675

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-105025

PATCH

title:iOSurl:https://www.apple.com/jp/ios/ios-11/

Trust: 0.8

title:NV18-001url:http://jpn.nec.com/security-info/secinfo/nv18-001.html

Trust: 0.8

title:Apple iOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74712

Trust: 0.6

title:blueborneurl:https://github.com/hw5773/blueborne

Trust: 0.1

title:-CVE-2017-0785-BlueBorne-PoCurl:https://github.com/Alfa100001/-CVE-2017-0785-BlueBorne-PoC

Trust: 0.1

title:awesome-bluetooth-securityurl:https://github.com/engn33r/awesome-bluetooth-security

Trust: 0.1

title: - url:https://github.com/JeffroMF/awesome-bluetooth-security321

Trust: 0.1

title:Threatposturl:https://threatpost.com/apple-patches-intel-side-channel-ios-macos/144743/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/blueborne-vulnerabilities-impact-over-5-billion-bluetooth-enabled-devices/

Trust: 0.1

sources: VULMON: CVE-2017-14315 // JVNDB: JVNDB-2017-007675 // CNNVD: CNNVD-201709-487

EXTERNAL IDS

db:NVDid:CVE-2017-14315

Trust: 3.8

db:BIDid:100816

Trust: 2.1

db:CERT/CCid:VU#240311

Trust: 2.0

db:LENOVOid:LEN-17125

Trust: 0.8

db:PACKETSTORMid:152848

Trust: 0.8

db:JVNid:JVNVU95513538

Trust: 0.8

db:JVNDBid:JVNDB-2017-007675

Trust: 0.8

db:CNNVDid:CNNVD-201709-487

Trust: 0.7

db:AUSCERTid:ESB-2019.1699

Trust: 0.6

db:VULHUBid:VHN-105025

Trust: 0.1

db:VULMONid:CVE-2017-14315

Trust: 0.1

sources: CERT/CC: VU#240311 // VULHUB: VHN-105025 // VULMON: CVE-2017-14315 // BID: 100816 // JVNDB: JVNDB-2017-007675 // PACKETSTORM: 152848 // CNNVD: CNNVD-201709-487 // NVD: CVE-2017-14315

REFERENCES

url:http://www.securityfocus.com/bid/100816

Trust: 1.9

url:https://seclists.org/bugtraq/2019/may/30

Trust: 1.9

url:https://support.apple.com/kb/ht210121

Trust: 1.8

url:http://seclists.org/fulldisclosure/2019/may/24

Trust: 1.8

url:https://www.armis.com/blueborne

Trust: 1.8

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2017-8628

Trust: 1.6

url:https://www.kb.cert.org/vuls/id/240311

Trust: 1.2

url:https://www.armis.com/blueborne/#/technical

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-14315

Trust: 0.9

url:https://source.android.com/security/bulletin/2017-09-01

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/120.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/122.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/125.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/191.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/300.html

Trust: 0.8

url:http://support.blackberry.com/kb/articledetail?articlenumber=000045807&language=en_us

Trust: 0.8

url:https://support.lenovo.com/us/en/product_security/len-17125

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-14315

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20170914_blueborne.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2017/at170037.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95513538/index.html

Trust: 0.8

url:https://www.armis.com/blueborne/

Trust: 0.8

url:https://support.apple.com/en-au/ht210121

Trust: 0.6

url:https://support.apple.com/en-us/ht210121

Trust: 0.6

url:https://packetstormsecurity.com/files/152848/apple-security-advisory-2019-5-13-6.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/80846

Trust: 0.6

url:http://www.apple.com/ios/

Trust: 0.3

url:http://www.apple.com/appletv/features.html

Trust: 0.3

url:http://www.apple.com/accessibility/tvos/

Trust: 0.3

url:http://go.armis.com/hubfs/blueborne technical white paper.pdf

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/alfa100001/-cve-2017-0785-blueborne-poc

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9417

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:http://seclists.org/fulldisclosure/

Trust: 0.1

url:https://nmap.org/mailman/listinfo/fulldisclosure

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-6975

Trust: 0.1

sources: CERT/CC: VU#240311 // VULHUB: VHN-105025 // VULMON: CVE-2017-14315 // BID: 100816 // JVNDB: JVNDB-2017-007675 // PACKETSTORM: 152848 // CNNVD: CNNVD-201709-487 // NVD: CVE-2017-14315

CREDITS

Apple

Trust: 0.7

sources: PACKETSTORM: 152848 // CNNVD: CNNVD-201709-487

SOURCES

db:CERT/CCid:VU#240311
db:VULHUBid:VHN-105025
db:VULMONid:CVE-2017-14315
db:BIDid:100816
db:JVNDBid:JVNDB-2017-007675
db:PACKETSTORMid:152848
db:CNNVDid:CNNVD-201709-487
db:NVDid:CVE-2017-14315

LAST UPDATE DATE

2024-11-23T19:38:28.047000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#240311date:2017-11-08T00:00:00
db:VULHUBid:VHN-105025date:2019-05-14T00:00:00
db:VULMONid:CVE-2017-14315date:2019-05-14T00:00:00
db:BIDid:100816date:2017-09-12T00:00:00
db:JVNDBid:JVNDB-2017-007675date:2018-02-07T00:00:00
db:CNNVDid:CNNVD-201709-487date:2021-10-29T00:00:00
db:NVDid:CVE-2017-14315date:2024-11-21T03:12:32.357

SOURCES RELEASE DATE

db:CERT/CCid:VU#240311date:2017-09-12T00:00:00
db:VULHUBid:VHN-105025date:2017-09-12T00:00:00
db:VULMONid:CVE-2017-14315date:2017-09-12T00:00:00
db:BIDid:100816date:2017-09-12T00:00:00
db:JVNDBid:JVNDB-2017-007675date:2017-09-28T00:00:00
db:PACKETSTORMid:152848date:2019-05-14T00:29:32
db:CNNVDid:CNNVD-201709-487date:2017-09-13T00:00:00
db:NVDid:CVE-2017-14315date:2017-09-12T15:29:00.190