A Vulnerability in Apple iOS Could Allow For Arbitrary Code Execution

ITS Advisory Number: 
2017-034
Date(s) Issued: 
Wednesday, April 5, 2017
Subject: 
A Vulnerability in Apple iOS Could Allow For Arbitrary Code Execution
Overview: 

A vulnerability has been discovered in Apple iOS, which could allow for arbitrary code execution. This vulnerability can be exploited by anyone within Wi-Fi range of the affected device. Successful exploitation of this vulnerability could result in arbitrary code execution within the context of the Wi-Fi chip. Depending on the privileges associated with the Wi-Fi chip, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If the Wi-Fi chip has been configured to have fewer user rights on the system, exploitation of this vulnerability could have less impact than if it was configured with administrative rights.

Systems Affected: 
  • iOS 10 versions prior to 10.3
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
Medium
BUSINESS
Large and medium business entities: 
High
Small business entities: 
Medium
Home Users: 
Low
Description: 

A vulnerability has been discovered in Apple iOS, which could allow for arbitrary code execution. This vulnerability can be exploited by anyone within Wi-Fi range of the affected device. Continuous sending of specially crafted wireless frames can cause an overflow of the firmware stack, allowing for a buffer overflow to occur. (CVE-2017-6975) 

Successful exploitation of this vulnerability could result in arbitrary code execution within the context of the Wi-Fi chip. Depending on the privileges associated with the Wi-Fi chip, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If the Wi-Fi chip has been configured to have fewer user rights on the system, exploitation of this vulnerability could have less impact than if it was configured with administrative rights.

Depending on the privileges associated with the user, a successful exploitation of this vulnerability could allow an attacker to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Actions: 
  • After appropriate testing, immediately install the patches provided by Apple to vulnerable systems.