Apple TV < 7.0.3 Multiple Vulnerabilities

critical Nessus Network Monitor Plugin ID 8640
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host is missing a critical Apple TV patch update.

Description

According to its banner, the remote Apple TV device is missing a security update. It is, therefore, affected by the following vulnerabilities :

- Apple TV is bundled with Apple WebKit. Apple WebKit is affected by several vulnerabilities which would allow a remote attacker to execute arbitrary code or crash the application. (CVE-2014-4476, CVE-2014-4477, CVE-2014-4459, CVE-2014-4479)
- There is a directory-traversal flaw in the 'afc' component which can allow an attacker to access unintended files. (CVE-2014-4480)
- There is a flaw in the 'mach_port_kobject' kernel interface which can allow an attacker to bypass the ASLR protection mechanism. (CVE-2014-4491, CVE-2014-4496)
- There is an integer overflow in CoreGraphics which allows remote code execution. (CVE-2014-4481)
- There is a buffer overflow in FontParser which allows remote code execution. (CVE-2014-4483)
- There is a flaw in the way that FontParser handles crafted .dfont file which can lead to remote code execution. (CVE-2014-4484)
- There is a buffer overflow in the XML parser portion of the Foundation component. (CVE-2014-4485)
- The IOAcceleratorFamily invalidly handles certain types which can lead to a NULL pointer dereference. (CVE-2014-4486)
- There is a buffer overflow in the IOHIDFamily component. (CVE-2014-4487)
- The IOHIDFamily does not properly validate resource-queue metadata, allowing remote code execution. (CVE-2014-4488)
- The IOHIDFamily fails to properly sanitize event queues. This can lead to remote code execution. (CVE-2014-4489)
- The kernel does not enforce read-only attributes which can allow attackers to bypass access restrictions. (CVE-2014-4495)
- The libnetcore module fails to verify certain data types which can allow remote code execution in the _networkd context. (CVE-2014-4492)

Solution

Upgrade to Apple TV 7.0.3 or later.

See Also

http://support.apple.com/HT204243

Plugin Details

Severity: Critical

ID: 8640

Published: 3/4/2015

Updated: 3/6/2019

Dependencies: 6485

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:apple:apple_tv:*:*:*:*:*:*:*:*

Patch Publication Date: 1/30/2015

Vulnerability Publication Date: 1/30/2015

Reference Information

CVE: CVE-2014-4459, CVE-2014-4479, CVE-2014-4476, CVE-2014-4492, CVE-2014-4477, CVE-2014-4496, CVE-2014-4480, CVE-2014-4481, CVE-2014-4483, CVE-2014-4484, CVE-2014-4485, CVE-2014-4487, CVE-2014-4488, CVE-2014-4489, CVE-2014-4491, CVE-2014-4495, CVE-2014-4486

BID: 72329, 72331, 72330, 72334, 71144, 72327, 72262