Apple TV < 7.0.3 Multiple Vulnerabilities

critical Nessus Plugin ID 81145
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote device is affected by multiple vulnerabilities.

Description

According to its banner, the remote Apple TV device is a version prior to 7.0.3. It is, therefore, affected by the following vulnerabilities :

- Multiple memory corruption issues exist, related to the included version of WebKit, that allow application crashes or arbitrary code execution. (CVE-2014-3192, CVE-2014-4459, CVE-2014-4466, CVE-2014-4468, CVE-2014-4469, CVE-2014-4470, CVE-2014-4471, CVE-2014-4472, CVE-2014-4473, CVE-2014-4474, CVE-2014-4475, CVE-2014-4476, CVE-2014-4477, CVE-2014-4479)

- A state management issue exists due to improperly handling overlapping segments in Mach-O executable files. A local user can exploit this issue to execute unsigned code. (CVE-2014-4455)

- A security bypass issue exists due to improper validation of SVG files loaded in an IMG element. An attacker can load a CSS of cross-origin resulting in information disclosure. (CVE-2014-4465)

- An issue exists due to the symbolic linking performed by the 'afc' command which allows an attacker to access arbitrary files on the system. (CVE-2014-4480)

- An integer overflow issue exists due to improper bounds checking when processing PDF files. (CVE-2014-4481)

- A buffer overflow issue exists due to improper bounds checking when processing fonts in PDF files.
(CVE-2014-4483)

- A memory corruption issue exists due to improper bounds checking when processing '.dfont' files.
(CVE-2014-4484)

- A buffer overflow issue exists due to improper bounds checking when processing XML files. (CVE-2014-4485)

- A null pointer dereference issue exists due to the handling of resource lists in the IOAcceleratorFamily kernel extension. (CVE-2014-4486)

- A buffer overflow issue exists due to improper size validation in the IOHIDFamily. (CVE-2014-4487)

- A validation issue exists due to the handling of resource queue metadata in the IOHIDFamily kernel extension. (CVE-2014-4488)

- A null pointer dereference issue exists due to the handling of event queues in the IOHIDFamily kernel extension. (CVE-2014-4489)

- An information disclosure issue exists due to the handling of APIs related to kernel extensions in which kernel addresses may be revealed. An attacker can leverage this to bypass ASLR protections.
(CVE-2014-4491)

- Multiple type confusion issues exists due to improper type checking during interprocess communication in the network daemon (networkd). (CVE-2014-4492)

- An issue exists due to improper checking of shared memory permissions in the kernel shared memory subsystem. (CVE-2014-4495)

- An information disclosure issue exists due to mach_port_kobject kernel interface leaking kernel addresses and heap permutation values. An attacker can leverage this to bypass ASLR protections.
(CVE-2014-4496)

Note that arbitrary code execution is possible with the above issues assigned CVE-2014-4481 through CVE-2014-4489, CVE-2014-4492, and CVE-2014-4495.

Solution

Upgrade to Apple TV 7.0.3 or later. Note that this update is only available for 3rd generation and later models.

See Also

https://support.apple.com/en-us/HT204246

http://www.nessus.org/u?6f3743d1

Plugin Details

Severity: Critical

ID: 81145

File Name: appletv_7_0_3.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 2/3/2015

Updated: 11/25/2019

Dependencies: appletv_detect.nasl

Risk Information

CVSS Score Source: CVE-2014-4495

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:2.3:a:apple:apple_tv:*:*:*:*:*:*:*:*

Required KB Items: www/appletv

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/27/2015

Vulnerability Publication Date: 1/27/2015

Reference Information

CVE: CVE-2014-3192, CVE-2014-4459, CVE-2014-4479, CVE-2014-4469, CVE-2014-4476, CVE-2014-4470, CVE-2014-4492, CVE-2014-4475, CVE-2014-4455, CVE-2014-4477, CVE-2014-4496, CVE-2014-4480, CVE-2014-4465, CVE-2014-4466, CVE-2014-4468, CVE-2014-4471, CVE-2014-4472, CVE-2014-4473, CVE-2014-4474, CVE-2014-4481, CVE-2014-4483, CVE-2014-4484, CVE-2014-4485, CVE-2014-4487, CVE-2014-4488, CVE-2014-4489, CVE-2014-4491, CVE-2014-4495, CVE-2014-4486

BID: 70273, 72329, 72331, 72330, 72334, 71140, 71144, 71438, 71439, 71442, 71444, 71445, 71449, 71451, 71459, 71461, 71462, 72327

APPLE-SA: APPLE-SA-2015-01-27-1