An issue was discovered in certain Apple products. iOS before 10.2 is affected. macOS before 10.12.2 is affected. watchOS before 3.1.3 is affected. The issue involves the "syslog" component. It allows local users to gain privileges via unspecified vectors related to Mach port name references.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.securityfocus.com/bid/94905 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1037469 | |
| https://support.apple.com/HT207422 | Vendor Advisory | 
| https://support.apple.com/HT207423 | Vendor Advisory | 
| https://support.apple.com/HT207487 | Vendor Advisory | 
| https://www.exploit-db.com/exploits/40959/ | |
| http://www.securityfocus.com/bid/94905 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1037469 | |
| https://support.apple.com/HT207422 | Vendor Advisory | 
| https://support.apple.com/HT207423 | Vendor Advisory | 
| https://support.apple.com/HT207487 | Vendor Advisory | 
| https://www.exploit-db.com/exploits/40959/ | 
Configurations
                    History
                    21 Nov 2024, 02:58
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.securityfocus.com/bid/94905 - Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1037469 - | |
| References | () https://support.apple.com/HT207422 - Vendor Advisory | |
| References | () https://support.apple.com/HT207423 - Vendor Advisory | |
| References | () https://support.apple.com/HT207487 - Vendor Advisory | |
| References | () https://www.exploit-db.com/exploits/40959/ - | 
Information
                Published : 2017-02-20 08:59
Updated : 2025-04-20 01:37
NVD link : CVE-2016-7660
Mitre link : CVE-2016-7660
CVE.ORG link : CVE-2016-7660
JSON object : View
Products Affected
                apple
- iphone_os
- mac_os_x
- watchos
CWE
                
                    
                        
                        CWE-264
                        
            Permissions, Privileges, and Access Controls
