Operating system vulnerabilities. Part III





Half way passed. We already know what holes are in the Android OS or macOS. Today we will talk about operating systems that are not as common as the same Android, but deserve no less attention. If you want to familiarize yourself with OS vulnerabilities from the previous parts - here are the references: Part I and Part II .



But for starters, I would like to remind you of why it is these OSs that we are examining today, how vulnerabilities are selected and what data about them is contained in the tables, of which you will see quite a bit lower in the text.



In this part we will study the third five operating systems from the table below (in bold):

OS name Manufacturer Total number of vulnerabilities for 2017 Total number of vulnerabilities for 2016 The total number of vulnerabilities for all time statistics
Android Google 666 523 1357
Linux Kernel Linux 381 217 1921
Iphone os Apple 293 161 1277
Windows 10 Microsoft 226 172 451
Windows Server 2016 Microsoft 212 39 251
Windows Server 2008 Microsoft 212 133 981
Mac os x Apple 210 215 1888
Windows Server 2012 Microsoft 201 156 606
Windows 7 Microsoft 197 134 838
Windows 8.1 Microsoft 192 154 542
Windows RT 8.1 Microsoft 124 139 438
Debian linux Debian 95 327 1029
Fedora Fedora project 84 120 441
Ubuntu linux Canonical 66 279 867
Watchos Apple 65 77 231
Windows vista Microsoft 64 125 814
Opensuse Opensuse project 58 five 119
Leap Opensuse project 57 2 60
Leap Novell 48 260 349
XEN XEN 44 28 228


Regarding the choice of vulnerabilities for more detailed consideration (since this was already written in the previous part, we will hide everything under the spoiler so as not to lengthen the text):
It is worth considering more closely some of the vulnerabilities seen on one or another OS. The CVE Details portal scores each of them. The number of points depends on the level of damage and mass distribution. The maximum indicator is 10 points. It is about such vulnerabilities (if they exist and if they are unique) that will be discussed further. In order for this article not to become Lenin’s five-volume, we will focus only on three vulnerabilities from the list, which may contain hundreds.


Regarding the data structure in the tables (since this was already written in the previous part, we will hide everything under the spoiler so as not to lengthen the text):
Description of the tables



In the tables of each of the types of vulnerabilities, certain additional parameters are indicated for a particular vulnerability. More about them.



Impact level



1) confidentiality :



  • Full - the vulnerability allows attackers to access all information on the device;
  • Partial - significant disclosure;
  • None - privacy is not violated;


2) integrity :



  • Full - the integrity of the system is completely compromised, the complete loss of system protection;
  • Partial - modification of some system files or information is possible, but the attacker has no control over what can be changed;
  • None - no impact on the integrity of the system;




3) availability :



  • Full - the vulnerability allows an attacker to completely block access to the resource;
  • Partial - performance degradation or intermittent availability of resources;
  • None - no impact on system availability;


Difficulty of access



  • Low - no special conditions for access are required, as well as no specific knowledge or skills are required;
  • Medium - some conditions must be met to gain access;
  • High - special access conditions limiting the exploit;


Authentication



  • Not required - authentication is not required for the exploit of the vulnerability;
  • Single system - the vulnerability requires the hacker to be logged into the system (for example, via the command line, desktop mode or via the web interface).




1. Windows Rt 8.1









Windows Rt 8.1 is the operating system of the Windows NT family, released October 26, 2012.







DoS



Total vulnerabilities - 36. 10 points scored - 0.



Vulnerability # 1 (9.3)



The usp10.dll in Uniscribe made it possible to add an entry to the EMF + font file, which made it possible to execute the code or result in DoS.



Vulnerability # 2 (9.3)



MSXML 3.0 allowed to create DoS through the created XML content.



Vulnerability # 3 (9.3)



The atmfd.dll in the Adobe Type Manager library allowed a remote attacker to arrange DoS through the font he created with OpenType.





Table of vulnerabilities category "DoS" in the OS Windows Rt 8.1



Bypassing something



53 vulnerabilities in all. 0 scored 10 points.



Vulnerability # 1 (9.3)



The OS allowed attackers to bypass the application sandbox security protocols and perform actions in the registry through the application created.



Vulnerability # 2 (9.3)



The OS allowed attackers to bypass the application sandbox security protocols and perform actions on the file system through the application created.



Vulnerability # 3 (7.6)



The OS could not correctly restrict the exchange of keyboard and mouse data between programs at different levels of integrity, which allowed the attacker to bypass access restrictions by gaining control over the low-level process to launch the on-screen keyboard, and then download the created application.





Vulnerability Table "Crawl" category in Windows Rt 8.1



Code execution



126 vulnerabilities in all. 10 points - 5.



Vulnerability # 1



The OS allowed the hacker to gain control of the system when Windows Search did not cope with the processing of memory objects.



Vulnerability # 2



The OS allowed the hacker to gain control of the system when Windows Search did not cope with the processing of memory objects.



Vulnerability # 3



OS allowed to execute arbitrary code remotely, because it could not process DNS responses.





Code Execution Vulnerability Table in Windows Rt 8.1



Memory damage



Total - 21 vulnerability. 10 points - 0.



Vulnerability # 1 (9.3)



The Imaging component allowed a remote hacker to execute code through the created document.



Vulnerability # 2 (9.3)



Animation Manager allowed a remote hacker to execute code through the created website.



Vulnerability # 3 (9.3)



The Media Foundation allowed the remote hacker to execute code through the website created.





Table of vulnerabilities of the category "memory corruption" in the OS Windows Rt 8.1



Access to the information



A total of 108 vulnerabilities detected. 10 points - 0.



Vulnerability # 1 (7.2)



Kernel-mode drivers could give an authenticated attacker the opportunity to execute an application created by him for information or even DoS.



Vulnerability # 2 (6.6)



win32k.sys in the kernel mode drivers made it possible for local users to acquire information from the kernel memory through the application created.



Vulnerability # 3 (5.8)



SChannel could not guarantee that the certificate of the X.509 server during the renewal is the same as before the renewal, which made it possible to obtain information or modify the TLS data through a "triple handshake attack".





Vulnerability table of the category "Access to Information" in Windows OS Rt 8.1



Privilege increase



Total - 155. 10 points scored 2.



Vulnerability # 1 (10)



OS kernel mode drivers allowed a local user to obtain privileges through the application created.



Vulnerability # 2 (10)



The Graphics component in the OS kernel allowed local users to get privileges through the application created.



Vulnerability # 3 (9.3)



Traversing the directory in the TSWbPrxy component of the OS made it possible to obtain privileges through the path created in the executable file.





Vulnerability table of the β€œPrivilege Increase” category in Windows Rt 8.1



Overflow



Total - 48. 10 points - 0.



Vulnerability # 1 (9.3)



The Uniscribe component, when an attempt to correctly process memory objects failed, resulted in the possibility of executing code.



Vulnerability # 2 (9.3)



The JET Database Engine gave control over the system, since it was processing memory objects.



Vulnerability # 3 (9.3)



The JET Database Engine gave control over the system, since it was processing memory objects.





Table of vulnerabilities category "Overflow" in OS Windows Rt 8.1



As in the previous version of Windows - the 8th, there is the same trend. A greater number of vulnerabilities relate to increased privileges, which leads to the possibility of activating remotely malicious software, which, in turn, can exploit other vulnerabilities and lead to various kinds of consequences.



2. Debian Linux





Debian Linux is an operating system first released on August 16, 1993. One of the most popular incarnations of Linux, Debian is suitable for use on both workstations and servers.



Funny fact: all working versions of the OS are named after the characters of the animated film β€œToy Story”. But the unstable version is called Sid (that was the name of the boy in the same cartoon that mocked the toys).







DoS



Total - 500 vulnerabilities. However, among such a large number, only 16 scored 10 points.



Vulnerability # 1



The xmlNextChar function in libxml2 allowed using a generated XML document to organize DoS by a remote hacker.



Vulnerability # 2



A buffer overflow in the heap of the encode_msg function in encode_msg.c in the SEAS Kamailio module allowed a remote attacker to arrange a DoS or execute code through a large SIP packet.



Vulnerability # 3



A number of unidentified vulnerabilities in Mozilla Firefox browser up to version 46.0 and Firefox ESR 45.x up to version 45.1 allowed a remote attacker to organize DoS through an undefined vector.





Table of vulnerabilities category "DoS" in the OS Debian Linux



Bypassing something



Of the 67 vulnerabilities, only 4 scored 10 points.



Vulnerability # 1



Gallery version 1.4.3 and later allowed you to bypass authentication and get Gallery administrator privileges.



Vulnerability # 2



Google Chrome, older than 48.0.2564.116, allowed you to bypass the rule of restricting the Blink domain and bypass the sandbox security protocols through an unspecified vector.



Vulnerability # 3



The pam_sm_authenticate function in pam_sshauth.c in libpam-sshauth allowed context-sensitive hackers to bypass authentication or obtain privileges through the user's system account.





Vulnerability Table "Crawl" category on Debian Linux OS



Code execution



Total - 200. 10 points - 25.



Vulnerability # 1



A number of unidentified vulnerabilities in Mozilla Firefox browser up to version 46.0 and Firefox ESR 45.x up to version 45.1 allowed a remote attacker to organize DoS through an undefined vector.



Vulnerability # 2



The OpenBlob function in blob.c in GraphicsMagick prior to version 1.3.24 and ImageMagick allowed an attacker to execute arbitrary code by using the β€œ|” symbol at the beginning of the file name.



Vulnerability # 3



The use-after-free vulnerability in __sys_recvmmsg in net / socket.c in the Linux kernel up to version 4.5.2 allowed a remote attacker to execute arbitrary code through vectors due to the use of an improper recvmmsg system call during error handling.





Code Execution Vulnerability Table on Debian Linux OS



Memory damage



Total - 37 vulnerabilities. Of these, 10 points scored 4.



Vulnerability # 1



A number of unidentified vulnerabilities in Mozilla Firefox browser up to version 46.0 and Firefox ESR 45.x up to version 45.1 allowed a remote attacker to organize DoS through an undefined vector.



Vulnerability # 2



A buffer overflow in the heap of the encode_msg function in encode_msg.c in the SEAS Kamailio module allowed a remote attacker to arrange a DoS or execute code through a large SIP packet.



Vulnerability # 3



A number of unidentified vulnerabilities in Mozilla Firefox browser up to version 46.0 and Firefox ESR 45.x up to version 45.1 allowed a remote attacker to organize DoS through an undefined vector.





Table of vulnerabilities of the category "memory corruption" in the OS Debian Linux



Access to the information



Total - 77. 10 points - 0 vulnerabilities.



Vulnerability # 1 (9.0)



The oarsh script in OAR up to version 2.5.7 allowed the remote authenticated cluster user to get valuable information and get privileges through vectors that include the OpenSSH options.



Vulnerability # 2 (7.5)



The htmlParseComment function in HTMLparser.c in libxml2 allowed access to information through an unclosed HTML comment.



Vulnerability # 3 (7.2)



x86 Xen emulation from 3.2.x to version 4.5.x incorrectly ignored redefinition of segments for instructions with register operands , which allowed the local guest user to get information through an unspecified vector.



The operand is the argument of the operation.





Vulnerability table of the Access to Information category on the Debian Linux OS



Privilege increase



Total detected 41 vulnerabilities. 10 points scored 2 of them.



Vulnerability # 1 (10)



The rpc.statd in the nfs-utils package on various Linux distributions did not include strings with an unreliable format, which made it possible to obtain privileges remotely.



Vulnerability # 2 (10)



The pam_sm_authenticate function in pam_sshauth.c in libpam-sshauth allowed context-sensitive hackers to bypass authentication or obtain privileges through the user's system account.



Vulnerability # 3 (9.0)



PostgreSQL incorrectly restricted access for unspecified user configuration settings for PL / Java, which allowed an attacker to obtain privileges through an unspecified vector.





Vulnerability privilege elevation table in Debian Linux OS



Overflow



Total - 294. 10 points - 25.



Vulnerability # 1



A software overflow in the PointGFp constructor in Botan allowed a remote attacker to rewrite the memory and execute arbitrary code through the point created by ECC , which caused a heap overflow.



ECC - error-correcting code.



Vulnerability # 2



A buffer overflow in the heap of the encode_msg function in encode_msg.c in the SEAS Kamailio module allowed a remote attacker to arrange a DoS or execute code through a large SIP packet.



Vulnerability # 3



A number of unidentified vulnerabilities in Mozilla Firefox browser up to version 46.0 and Firefox ESR 45.x up to version 45.1 allowed a remote attacker to organize DoS through an undefined vector.





Table of vulnerabilities category "Overflow" in the OS Debian Linux



Despite the rather large number of vulnerabilities, especially in the DoS category, the level of their exploit and corresponding consequences is not so great. Due to its specific architecture, the Debian Linux OS can withstand most malicious attacks, which makes it extremely popular among companies that value their data. Even NASA uses this OS on astronaut workstations on the ISS.



3. Fedora





Fedora is the distribution of the GNU / Linux operating system, first released on November 6, 2003. This distribution is fully supported by the community, that is, those who use it and those who develop software for it. Fedora is a kind of sandbox for developers, as the software consists of free software, i.e. one that can be used indefinitely and even changed by the user.







DoS



Of the 205 vulnerabilities, 10 scored the maximum score.



Vulnerability # 1



Software overflow in the RTPReceiverVideo :: ParseRtpPacket function in Mozilla Firefox up to version 43.0 and in Firefox ESR 38.x up to version 38.5 allowed the hacker to get information, organize DoS through activating the WebRTC RTP package.



Vulnerability # 2



The buffer overflow in the XDRBuffer :: grow function in js / src / vm / Xdr.cpp in Mozilla Firefox prior to version 43.0 made it possible to arrange DoS through the generated JavaScript code.



Vulnerability # 3



The buffer overflow in the nsDeque :: GrowCapacity function in xpcom / glue / nsDeque.cpp in Mozilla Firefox prior to version 43.0 made it possible to arrange DoS through changing the size of the deck .



December - deque is the abbreviated phrase "double-ended-queue", which, in translation from English, means two-way queue. Container Dec is very similar to container - Vector, as well as Vectors, Decks are dynamic arrays.





The DoS category vulnerability table on Fedora



Bypassing something



Not one vulnerability out of 25 did not score 10 points.



Vulnerability # 1 (9.3)



OpenOffice.org (versions: 2.x, 3.0 to 3.2.1) allowed you to bypass Python macro security restrictions and execute Python code through the generated ODT file.



Vulnerability # 2 (9.3)



The scm plugin in mock allowed to bypass the chroot protection mechanisms and get root privileges through the created spec file.



Vulnerability # 3 (7.5)



ganglia-web up to version 3.7.1 allowed to bypass authentication.





Vulnerability Table "Crawl" category in Fedora OS



Code execution



Total - 84. 10 points - 6.



Vulnerability # 1



The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot prior to version 3.2.22 allowed the command to be executed via the metacharacters in the file name.



Vulnerability # 2



Software overflow in the RTPReceiverVideo :: ParseRtpPacket function in Mozilla Firefox up to version 43.0 and in Firefox ESR 38.x up to version 38.5 allowed the hacker to get information, organize DoS through activating the WebRTC RTP package.



Vulnerability # 3



A number of unknown vulnerabilities in Mozilla Firefox browser up to version 43.0 allowed a remote attacker to execute arbitrary code via an uninstall vector.





Code Execution Vulnerability Table in Fedora



Memory damage



Total - 12. 10 points - 4.



Vulnerability # 1



The mozilla :: dom :: OscillatorNodeEngine :: ComputeCustom function in the Web Audio subsystem in Mozilla Firefox prior to version 29.0 and SeaMonkey up to version 2.26 allowed remote attackers to execute arbitrary code or arrange DoS through the created content.



Vulnerability # 2



Many unknown vulnerabilities in Mozilla Firefox browser up to version 43.0 and Firefox ESR 38.x up to version 38.5 allowed attackers to arrange DoS, damage memory and execute arbitrary code.



Vulnerability # 3



A number of unknown vulnerabilities in Mozilla Firefox browser up to version 43.0 allowed a remote attacker to execute arbitrary code via an undefined vector.





Memory Corruption Vulnerability Table for Fedora



Access to the information



Of the 53 vulnerabilities, only one scored 10 points.



Vulnerability # 1 (10)



Software overflow in the RTPReceiverVideo :: ParseRtpPacket function in Mozilla Firefox up to version 43.0 and Firefox ESR 38.x up to version 38.5 allowed remote attackers to obtain information, arrange DoS through the activation of the created WebRTC RTP package.



Vulnerability # 2 (7.2)



x86 Xen emulation from 3.2.x to version 4.5.x incorrectly ignored redefinition of segments for instructions with register operands, which allowed the local guest user to get information through an unspecified vector.



Vulnerability # 3 (6.9)



Multiple software overflows in Grub2 1.98-2.02 allowed to bypass authentication, get information, or arrange DoS through a space in the grub_username_get function in grub-core / normal / auth.c or the grub_password_get function in lib / crypto.c, which caused errors in the memory β€œOff” -by-two and out of bounds overwrite.





The Access to Information Vulnerability Table on Fedora



Privilege increase



Of the 20 vulnerabilities, only one scored 10 points.



Vulnerability # 1 (10)



libuv prior to version 0.10.34 incorrectly handled group privileges, which allowed the attacker to obtain privileges through an unspecified vector.



Vulnerability # 2 (9.3)



The scm plugin in mock allowed to bypass the chroot protection mechanisms and get root privileges through the created spec file.



Vulnerability # 3 (7.5)



The XGetImage function in X.org libX11 up to version 1.6.4 allowed remote X servers to obtain privileges through vectors including the image type and geometry, which caused an out-of-bounds read operation.





Privilege Increase Vulnerability Table in Fedora OS



Overflow



8 vulnerabilities out of 123 scored 10 points.



Vulnerability # 1



The buffer overflow in the DirectWriteFontInfo :: LoadFontFamilyData function in gfx / thebes / gfxDWriteFontList.cpp in Mozilla Firefox prior to version 43.0 allowed crackers to arrange DoS and have other types of implementations through the font name.



Vulnerability # 2



The buffer overflow in the XDRBuffer :: grow function in js / src / vm / Xdr.cpp in Mozilla Firefox prior to version 43.0 allowed the remote attacker to arrange DoS through the generated JavaScript code.



Vulnerability # 3



The buffer overflow in the nsDeque :: GrowCapacity function in xpcom / glue / nsDeque.cpp in Mozilla Firefox browser prior to version 43.0 allowed the remote attacker to arrange DoS by activating the resize of the deck.





Overflow Vulnerability Table in Fedora



Despite the fact that Fedora has been around for almost 15 years, the total number of vulnerabilities recorded is relatively small. It can be argued that this is due to the use of open source software. Since the users themselves improve it. The more people working on the software, the more chances he has to avoid some bugs and holes. As they say, one head is good, but two is better.



4. Ubuntu Linux







Ubuntu Linux is an operating system based on Debian GNU / Linux. The first appearance is October 20, 2004. The estimated number of users is about 20 million. Another OS with free software. Extremely popular. It is used both in the French government, and as the main OS on Google’s workstations, and as a database server for the Wikipedia project, etc.







DoS



Of the 441 vulnerabilities, only 12 scored 10 points.



Vulnerability # 1



A number of unidentified vulnerabilities in Google Chrome prior to version 50.0.2661.75 resulted in DoS via an unidentified vector.



Vulnerability # 2



The xmlNextChar function in libxml2 up to version 2.9.4 allowed the remote attacker to arrange DoS through the generated XML document.



Vulnerability # 3



The usbip_recv_xbuff function in drivers / usb / usbip / usbip_common.c in the Linux kernel before version 4.5.3 allowed the remote attacker to arrange DoS through the created value in the USB / IP package.





Table of vulnerabilities category "DoS" in OS Ubuntu Linux



Bypassing something



Of the 70 vulnerabilities, no one was awarded 10 points.



Vulnerability # 1 (9.3)



OpenOffice.org (versions: 2.x, 3.0 to 3.2.1) allowed you to bypass Python macro security restrictions and execute Python code through the generated ODT file.



Vulnerability # 2 (9.0)



The openvswitch-agent process in OpenStack Neutron from 2013.1 to 2013.2.4 and from 2014.1 to 2014.1.1 allowed the remote authenticated user to bypass the security protocols through the wrong CIDR in the group security rule, which prevented the activation of other rules.



Vulnerability # 3 (7.5)



The nbd-server in Network Block Device (nbd) up to version 3.5 incorrectly checked IP addresses, which could allow a remote attacker to bypass the established access restrictions via an IP address which partially coincides in the authfile configuration file.





Vulnerability Table "Crawl" category on Ubuntu Linux



Code execution



18 vulnerabilities out of 152 scored 10 points.



Vulnerability # 1



EPHEMERAL, HTTPS, MVG, MSL, TEXT, SHOW, WIN and PLT coders in ImageMagick up to version 6.9.3-10 and 7.x up to version 7.0.1-1 allowed the remote hacker to execute code through the metacharacters shell in the created image.



Vulnerability # 2



The OpenBlob function in blob.c in GraphicsMagick prior to version 1.3.24 and ImageMagick allowed a remote attacker to execute arbitrary code through the β€œ|” symbol at the beginning of the file name.



Vulnerability # 3



The use-after-free vulnerability in the __sys_recvmmsg function in net / socket.c in the Linux kernel version 4.5.2 allowed a remote attacker to execute arbitrary code through vectors due to the use of an improper system call recvmmsg during error handling.





Code Execution Vulnerability Table in Ubuntu Linux OS



Memory damage



10 points out of 41 vulnerabilities scored only 6.



Vulnerability # 1



Many unknown vulnerabilities in Mozilla Firefox browser up to version 39.0, Firefox ESR 31.x up to 31.8 and from 38.x up to 38.1, as well as Thunderbird up to version 38.1 allowed the remote hacker to damage the memory through an unspecified vector.



Vulnerability # 2



A number of unidentified vulnerabilities in Mozilla Firefox browser up to version 40.0 and Firefox ESR from 38.x to 38.2 made it possible for a remote attacker to cause memory damage and application crashes through an unspecified vector.



Vulnerability # 3



A number of unidentified vulnerabilities in Mozilla Firefox browser up to version 40.0 made it possible for a remote attacker to cause memory damage through an unidentified vector.





Table of vulnerabilities of the category "memory corruption" in the OS Ubuntu Linux



Access to information



None of the 86 vulnerabilities scored 10 points.



Vulnerability # 1 (8.5)



The OZWPAN driver in the Linux kernel up to version 4.0.5 relied on the unchecked field length value during packet parsing, which allowed the remote attacker to obtain information from the kernel memory or to organize DoS through the created package.



Vulnerability # 2 (7.2)



The __switch_to function in arch / x86 / kernel / process_64.c in the Linux kernel incorrectly switched the context of IOPL 64-bit PV Xen guests, which allowed the local guest user to get privileges, arrange DoS or get information using access to the port I / o.



Vulnerability # 3 (7.2)



get_rock_ridge_filename fs/isofs/rock.c Linux 4.5.5 NM, Β«\0Β», isofs.





Β« Β» Ubuntu Linux







44 , 10 .



β„–1 (9.0)



PostgreSQL PL/Jav, .



β„–2 (7.6)



openstack-neutron 2013.2.3-7 rootwrap, .



β„–3 (7.5)



click/install.py click tarballs ./, .





Β« Β» Ubuntu Linux







β€” 223 . 10 β€” 14 .



β„–1



Unknown vulnerability in Oracle Java SE (6u105, 7u91, 8u66); Java SE Embedded 8u65; JRockit R28.3.8 allowed a remote attacker to affect the confidentiality, integrity and availability of the system through a vector including AWT. NOTE: Oracle did not confirm the words of third parties that it was a software buffer overflow in the readImage function, which allowed the remote attacker to execute code through the created image data.



Vulnerability # 2



The xmlNextChar function in libxml2 up to version 2.9.4 allowed a remote attacker to create a buffer overflow through the generated XML document.



Vulnerability # 3



The usbip_recv_xbuff function in drivers / usb / usbip / usbip_common.c in the Linux kernel version 4.5.3 allowed the remote attacker to cause a buffer overflow through the generated length value in the USB / IP package.





Table of vulnerabilities of the category "Overflow" in OS Ubuntu Linux



Most of all vulnerabilities are fixed in the category "DoS" (441), however the critical is extremely small. As for the other categories, among them the number of top-level vulnerabilities also does not cause concern. Resistance to external malicious effects of the system and the insignificance of the consequences of the exploit of vulnerabilities are one of the decisive factors in choosing this OS.



5. WatchOS







WatchOS - a special operating system for Apple Watch, was released on April 24, 2015. The OS is not for the PC, not for the server, but for the wristwatch. But this is still an operating system, and it, like the others, has its drawbacks.







DoS



Of the 181 vulnerabilities, 9 pieces scored 10 points.



Vulnerability # 1



Vulnerability was detected in watchOS prior to version 4. The basis is the β€œWi-Fi” component, which allowed the remote attacker to execute code in a privileged context or to set up DoS through the created Wi-Fi traffic.



Vulnerability # 2



The xmlNextChar function in libxml2 up to version 2.9.4 allowed the remote attacker to arrange DoS through the created XML document.



Vulnerability # 3



The LaunchServices component allowed an attacker to execute arbitrary code or organize DoS (memory corruption) through a modified plist.





Table of vulnerabilities in the DoS category in WatchOS OS.



Bypassing something



10 vulnerabilities, of which there are no those that scored 10 points.



Total - 16. 10 points - 0.



Vulnerability # 1 (9.3)



The kernel in watchOS prior to version 2.2 incorrectly restricted the execution permission, which allowed the hacker to bypass the code signature protection mechanism through the created application.



Vulnerability # 2 (7.2)



Implementing the processor_set_tasks API in the OS allowed a local user to bypass the rights protection mechanism and gain access to the task ports of the executable process through the use of root privileges.



Vulnerability # 3 (6.8)



AppSandbox watchOS 2.1 , Contacts .





Β« -Β» WatchOS







7 137 10 .



β„–1



libxml2 watchOS 3 DoS XML .



β„–2



LaunchServices watchOS 2.1 DoS plist .



plist β€” , .



β„–3 (9.3)



IOKit in the OS kernel allowed the hacker to execute code in a privileged context or to arrange DoS through the application created.





Table Execution Code Vulnerability Table on WatchOS



Memory corruption



8 vulnerabilities out of 120 scored 10 points.



Vulnerability # 1 (9.3)



IOHIDFamily allowed a cracker to execute code in a privileged context or to set up a DoS through the application created.



Vulnerability # 2 (9.3)



dyld in Dev Tools allowed a cracker to execute code in a privileged context or arrange DoS through the application created.



Vulnerability # 3 (9.3)



WebKit allowed a cracker to execute code or set up a DoS through the created website.





Table of vulnerabilities in the category "memory corruption" in OS WatchOS







33 , 10 .



β„–1 (6.8)



libxml2 DoS XML .



β„–2 (5.8)



xmlSAX2TextNode SAX2.c push- HTML libxml2 2.9.3 DoS XML .



β„–3 (5.8)



IOAcceleratorFamily watchOS 3 DoS -.





Β« Β» WatchOS







1 21 10 .



β„–1 (10)



DoS .



β„–2 (7.2)



IOMobileFrameBuffer DOS .



β„–3 (7.2)



Disk Images DoS .





Β« Β» WatchOS







10 154 10 .



β„–1 (9.3)



GasGauge DoS .



β„–2 (9.3)



FontParser watchOS 2.2 DoS PDF .



β„–3 (9.3)



TrueTypeScaler watchOS 2.2 DoS .





«» WatchOS



Apple, , . , , WatchOS . . .



, , , . , . , , Windows Vista , . .



As advertising. These are not just virtual servers! This is a VPS (KVM) with dedicated drives, which can be no worse than dedicated servers, and in most cases - better! We made VPS (KVM) with dedicated drives in the Netherlands and the USA (configurations from VPS (KVM) - E5-2650v4 (6 Cores) / 10GB DDR4 / 240GB SSD or 4TB HDD / 1Gbps 10TB available at a uniquely low price - from $ 29 / month , options are available with RAID1 and RAID10) , do not miss the chance to place an order for a new type of virtual server, where all resources belong to you, as on a dedicated one, and the price is much lower, with a much more productive hardware!



How to build the infrastructure of the building. class c using servers Dell R730xd E5-2650 v4 worth 9000 euros for a penny? Dell R730xd 2 times cheaper? Only we have 2 x Intel Dodeca-Core Xeon E5-2650v4 128GB DDR4 6x480GB SSD 1Gbps 100 TV from $ 249 in the Netherlands and the USA!



All Articles