
====================================================================

                              CERT-Renater

                 Note d'Information No. 2017/VULN218
_____________________________________________________________________

DATE                : 20/07/2017

HARDWARE PLATFORM(S):  All Apple Watch models

OPERATING SYSTEM(S):  Systems running watchOS 3.2.3

=====================================================================
https://support.apple.com/fr-fr/HT207925
____________________________________________________________________


watchOS 3.2.3

Released July 19, 2017

Contacts

Available for: All Apple Watch models

Impact: A remote attacker may be able to cause unexpected application
termination or arbitrary code execution

Description: A buffer overflow issue was addressed through improved
memory handling.

CVE-2017-7062: Shashank (@cyberboyIndia)

IOUSBFamily

Available for: All Apple Watch models

Impact: An application may be able to execute arbitrary code with kernel
privileges

Description: A memory corruption issue was addressed with improved
memory handling.

CVE-2017-7009: shrek_wzw of Qihoo 360 Nirvan Team

Kernel

Available for: All Apple Watch models

Impact: An application may be able to execute arbitrary code with system
privileges

Description: A memory corruption issue was addressed with improved
memory handling.

CVE-2017-7022: an anonymous researcher

CVE-2017-7024: an anonymous researcher

CVE-2017-7026: an anonymous researcher

Kernel

Available for: All Apple Watch models

Impact: An application may be able to execute arbitrary code with kernel
privileges

Description: A memory corruption issue was addressed with improved
memory handling.

CVE-2017-7023: an anonymous researcher

CVE-2017-7025: an anonymous researcher

CVE-2017-7027: an anonymous researcher

CVE-2017-7069: Proteas of Qihoo 360 Nirvan Team

Kernel

Available for: All Apple Watch models

Impact: An application may be able to read restricted memory

Description: A validation issue was addressed with improved input
sanitization.

CVE-2017-7028: an anonymous researcher

CVE-2017-7029: an anonymous researcher

libarchive

Available for: All Apple Watch models

Impact: Unpacking a maliciously crafted archive may lead to arbitrary
code execution

Description: A buffer overflow was addressed through improved bounds
checking.

CVE-2017-7068: found by OSS-Fuzz

libxml2

Available for: All Apple Watch models

Impact: Parsing a maliciously crafted XML document may lead to
disclosure of user information

Description: An out-of-bounds read was addressed through improved bounds
checking.

CVE-2017-7013: found by OSS-Fuzz

libxpc

Available for: All Apple Watch models

Impact: An application may be able to execute arbitrary code with system
privileges

Description: A memory corruption issue was addressed with improved
memory handling.

CVE-2017-7047: Ian Beer of Google Project Zero

Messages

Available for: All Apple Watch models

Impact: A remote attacker may cause an unexpected application termination

Description: A memory consumption issue was addressed through improved
memory handling.

CVE-2017-7063: Shashank (@cyberboyIndia)

Wi-Fi

Available for: All Apple Watch models

Impact: An attacker within range may be able to execute arbitrary code
on the Wi-Fi chip

Description: A memory corruption issue was addressed with improved
memory handling.

CVE-2017-9417: Nitay Artenstein of Exodus Intelligence

Information about products not manufactured by Apple, or independent
websites not controlled or tested by Apple, is provided without
recommendation or endorsement. Apple assumes no responsibility with
regard to the selection, performance, or use of third-party websites or
products. Apple makes no representations regarding third-party website
accuracy or reliability. Risks are inherent in the use of the Internet.
Contact the vendor for additional information. Other company and product
names may be trademarks of their respective owners.
Date de publication : Jul 19, 2017


==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================










