Apple iOS < 10.3.1 RCE

High Nessus Network Monitor Plugin ID 700115

Synopsis

The remote host is running a version of Apple iOS that is affected by a Remote Code Execution (RCE) attack vector.

Description

The version of iOS running on the mobile device is prior to 10.3.1, and is affected by an overflow condition that exists in the Wi-Fi HardMAC SoCs. The issue is triggered as input is not properly validated when handling FT-IEs in 802.11r Fast BSS Transition Authentication Responses. This may allow an proximate attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.

Solution

Upgrade to Apple iOS 10.3.1 or later.

See Also

https://support.apple.com/en-us/HT207688

Plugin Details

Severity: High

ID: 700115

Published: 2017/05/17

Modified: 2018/09/16

Dependencies: 8637

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 8.4

Temporal Score: 8

Vector: CVSS3#AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:apple:iphone_os

Patch Publication Date: 2017/04/03

Vulnerability Publication Date: 2017/04/03

Reference Information

CVE: CVE-2017-6975

BID: 97328