Multiple Vulnerabilities in Apple Products Could Allow Remote Code Execution

ITS Advisory Number: 
2015-129
Date(s) Issued: 
Friday, October 16, 2015
Subject: 
Multiple Vulnerabilities in Apple Products Could Allow Remote Code Execution
Overview: 

Multiple vulnerabilities have been discovered in Keynote, Pages, and Numbers that could lead to remote code execution. Keynote is used to prepare presentations on Apple platforms. Pages is a word processing software for the Apple platform and the Numbers application is used to work with spreadsheets.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user, remote code execution within the context of the application, and the ability to bypass the security system. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Systems Affected: 
  • OS X Yosemite v10.10.4 or later
  • iOS 8.4 or later
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

Multiple Vulnerabilities have been discovered in Keynote, Pages, and Numbers. The most serious of these vulnerabilities could lead to remote code execution. Details of these vulnerabilities are as follows:

  • Multiple input validation issues existed in parsing a maliciously crafted document. These issues were addressed through improved input validation. (CVE-2015-3784, CVE-2015-7032)
  • Memory corruption vulnerability for Keynote, Pages, and Numbers could allow for arbitrary code execution when opening a maliciously crafted document. (CVE-2015-7033)
  • Memory corruption vulnerability for Pages could allow for arbitrary code execution when opening a maliciously crafted document. (CVE-2015-7034)

Successful exploitation could result in an attacker gaining the same privileges as the logged on user, remote code execution within the context of the application, and the ability to bypass the security system. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Actions: 
  • Apply appropriate updates provided by Apple to vulnerable systems immediately after appropriate testing.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to download, accept, or execute files from un-trusted or unknown sources.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.