개요
o Apple社에서 자사 제품에 대해 다수의 취약점을 해결한 보안 업데이트를 공지
o 공격자는 취약점을 악용하여 피해를 발생시킬 수 있으므로, 해당 Apple 제품을 사용하는 이용자들은 최신 버전으로 업데이트 권고

□ 내용
o tvOS의 Contacts에서 임의코드실행을 가능하게 하는 BOF 취약점(CVE-2017-7062) 등 38건
o iTunes에서 발생하는 임의코드실행 취약점(CVE-2017-7053) 등 23건
o iCloud의 libxml2에서 발생하는 사용자 정보 노출 취약점(CVE-2017-7010) 등 22건
o Safari의 WebKit에서 발생하는 주소 표시줄 스푸핑 취약점(CVE-2017-7011) 등 25건
o macOS Sierra의 afclip에서 발생하는 임의코드실행 취약점(CVE-2017-7016) 등 37건
o iOS의 Messages에서 발생하는 메모리손상 취약점(CVE-2017-7063) 등 47건
o watchOS의 Wi-Fi에서 임의코드실행을 가능하게 하는 메모리손상 취약점(CVE-2017-9417) 등 16건

□ 영향을 받는 제품 및 버전
o tvOS
- tvOS 10.2.2 미만 버전 [1]
o iTunes for Windows
- iTunes 12.6.2 미만 버전 [2]
o iCloud for Windows
- iCloud for Windows 6.2.2 미만 버전 [3]
o Safari
- Safari 10.1.2 미만 버전 [4]
o macOS Sierra
- macOS Sierra 10.12.6 미만 버전 [5]
o iOS
- iOS 10.3.3 미만 버전 [6]
o watchOS
- watchOS 3.2.3 미만 버전 [7]

□ 해결 방안
o iTunes, macOS Sierra, Safari 사용자
- 홈페이지 직접 설치 : http://support.apple.com/downloads/
- App Store 이용 : 애플 메뉴에서 [소프트웨어 업데이트] 선택
o iOS 사용자
- [설정] → [일반] → [소프트웨어 업데이트] → [다운로드 및 설치] 선택하여 업데이트
o tvOS 사용자
- Apple TV에서 [설정] → [시스템] → [소프트웨어 업데이트] → [소프트웨어 업데이트하기]를 선택하여 업데이트
o watchOS 사용자
- ‘Apple Watch’ App에서 [나의 시계] → [일반] → [소프트웨어 업데이트]를 선택하여 업데이트



[참고사이트]
[1] https://support.apple.com/en-us/HT207924
[2] https://support.apple.com/en-us/HT207928
[3] https://support.apple.com/en-us/HT207927
[4] https://support.apple.com/en-us/HT207921
[5] https://support.apple.com/en-us/HT207922
[6] https://support.apple.com/en-us/HT207923
[7] https://support.apple.com/en-us/HT207925

저작자 표시 비영리 변경 금지
신고
블로그 이미지

Ryansecurity Ryansecurity

Life is fun security story

iOS, Mac OS, 사파리, 아이튠즈 및 윈도용 iCloud 등 다양한 제품의 취약점을 해결하기 위한 업데이트를 발표하였다. iOS용 업데이트인 버전 10.3.3은 BroadPwn으로 알려진 취약점을 수정한다. 이 취약점은 애플 및 안드로이드 기기에 사용되는 브로드컴 칩셋에 존재한다.
http://www.theregister.co.uk/2017/07/19/apple_patches_ios_os_x_flaws/
http://threatpost.com/apple-patches-broadpwn-bug-in-ios-10-3-3/126955/
http://www.us-cert.gov/ncas/current-activity/2017/07/19/Apple-Releases-Security-Updates

저작자 표시 비영리 변경 금지
신고
블로그 이미지

Ryansecurity Ryansecurity

Life is fun security story

IOS 10.3.3

Released July 19, 2017
Contacts
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution
Description: A buffer overflow issue was addressed through improved memory handling.
CVE-2017-7062: Shashank (@cyberboyIndia)
CoreAudio
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Processing a maliciously crafted movie file may lead to arbitrary code execution
Description: A memory corruption issue was addressed with improved bounds checking.
CVE-2017-7008: Yangkang (@dnpushme) of Qihoo 360 Qex Team
EventKitUI
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: A remote attacker may cause an unexpected application termination
Description: A resource exhaustion issue was addressed through improved input validation.
CVE-2017-7007: José Antonio Esteban (@Erratum_) of Sapsi Consultores
IOUSBFamily
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7009: shrek_wzw of Qihoo 360 Nirvan Team
Kernel
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7022: an anonymous researcher
CVE-2017-7024: an anonymous researcher
CVE-2017-7026: an anonymous researcher
Kernel
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7023: an anonymous researcher
CVE-2017-7025: an anonymous researcher
CVE-2017-7027: an anonymous researcher
CVE-2017-7069: Proteas of Qihoo 360 Nirvan Team
Kernel
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input sanitization.
CVE-2017-7028: an anonymous researcher
CVE-2017-7029: an anonymous researcher
libarchive
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution
Description: A buffer overflow was addressed through improved bounds checking.
CVE-2017-7068: found by OSS-Fuzz
libxml2
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information
Description: An out-of-bounds read was addressed through improved bounds checking.
CVE-2017-7010: Apple
CVE-2017-7013: found by OSS-Fuzz
libxpc
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: An application may be able to execute arbitrary code with system privileges
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-7047: Ian Beer of Google Project Zero
Messages
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: A remote attacker may cause an unexpected application termination
Description: A memory consumption issue was addressed through improved memory handling.
CVE-2017-7063: Shashank (@cyberboyIndia)
Notifications
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Notifications may appear on the lock screen when disabled
Description: A lock screen issue was addressed with improved state management.
CVE-2017-7058: an anonymous researcher
Safari
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Visiting a malicious website may lead to address bar spoofing
Description: An inconsistent user interface issue was addressed with improved state management.
CVE-2017-2517: xisigr of Tencent's Xuanwu Lab (tencent.com)
Safari Printing
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Processing maliciously crafted web content may lead to an infinite number of print dialogs
Description: An issue existed where a malicious or compromised website could show infinite print dialogs and make users believe their browser was locked. The issue was addressed through throttling of print dialogs.
CVE-2017-7060: Travis Kelley of City of Mishawaka, Indiana
Telephony
Available for: iPhone 5 and later, and WiFi + Cellular models of iPad 4th generation and later
Impact: An attacker in a privileged network position may be able to execute arbitrary code
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-8248
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: A malicious website may exfiltrate data cross-origin
Description: Processing maliciously crafted web content may allow cross-origin data to be exfiltrated by using SVG filters to conduct a timing side-channel attack. This issue was addressed by not painting the cross-origin buffer into the frame that gets filtered.
CVE-2017-7006: an anonymous researcher, David Kohlbrenner of UC San Diego
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Visiting a malicious website may lead to address bar spoofing
Description: A state management issue was addressed with improved frame handling.
CVE-2017-7011: xisigr of Tencent's Xuanwu Lab (tencent.com)
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: Multiple memory corruption issues were addressed with improved memory handling.
CVE-2017-7018: lokihardt of Google Project Zero
CVE-2017-7020: likemeng of Baidu Security Lab
CVE-2017-7030: chenqin of Ant-financial Light-Year Security Lab (蚂蚁金服巴斯光年安全实验室)
CVE-2017-7034: chenqin of Ant-financial Light-Year Security Lab (蚂蚁金服巴斯光年安全实验室)
CVE-2017-7037: lokihardt of Google Project Zero
CVE-2017-7039: Ivan Fratric of Google Project Zero
CVE-2017-7040: Ivan Fratric of Google Project Zero
CVE-2017-7041: Ivan Fratric of Google Project Zero
CVE-2017-7042: Ivan Fratric of Google Project Zero
CVE-2017-7043: Ivan Fratric of Google Project Zero
CVE-2017-7046: Ivan Fratric of Google Project Zero
CVE-2017-7048: Ivan Fratric of Google Project Zero
CVE-2017-7052: cc working with Trend Micro's Zero Day Initiative
CVE-2017-7055: The UK's National Cyber Security Centre (NCSC)
CVE-2017-7056: lokihardt of Google Project Zero
CVE-2017-7061: lokihardt of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Processing maliciously crafted web content with DOMParser may lead to cross site scripting
Description: A logic issue existed in the handling of DOMParser. This issue was addressed with improved state management.
CVE-2017-7038: Egor Karbutov (@ShikariSenpai) of Digital Security and Egor Saltykov (@ansjdnakjdnajkd) of Digital Security, Neil Jenkins of FastMail Pty Ltd
CVE-2017-7059: an anonymous researcher
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: Multiple memory corruption issues were addressed through improved memory handling.
CVE-2017-7049: Ivan Fratric of Google Project Zero
WebKit
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: An application may be able to read restricted memory
Description: A memory initialization issue was addressed through improved memory handling.
CVE-2017-7064: lokihardt of Google Project Zero
WebKit Page Loading
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: Multiple memory corruption issues were addressed with improved memory handling.
CVE-2017-7019: Zhiyang Zeng of Tencent Security Platform Department
WebKit Web Inspector
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: Processing maliciously crafted web content may lead to arbitrary code execution
Description: Multiple memory corruption issues were addressed with improved memory handling.
CVE-2017-7012: Apple
Wi-Fi
Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation
Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip
Description: A memory corruption issue was addressed with improved memory handling.
CVE-2017-9417: Nitay Artenstein of Exodus Intelligence

저작자 표시 비영리 변경 금지
신고
블로그 이미지

Ryansecurity Ryansecurity

Life is fun security story

티스토리 툴바