First published: Thu May 26 2016(Updated: )
It was found that libimobiledevice and libusbmuxd libraries accidentally bound a listening IPv4 TCP socket to INADDR_ANY instead of INADDR_LOOPBACK. This socket is used to communicate with services on an iOS device. The impact is accidental exposure of the iOS device to attackers on the local network. The RHEL workstation itself is not exposed, nor is there an easy escalation for attackers to gain access to the host. Upstream patches: libusbmuxd: <a href="https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196">https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196</a> libimobiledevice: <a href="https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e">https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e</a> CVE request: <a href="http://seclists.org/oss-sec/2016/q2/410">http://seclists.org/oss-sec/2016/q2/410</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
libimobiledevice and libplist | <=1.2.0 | |
libusbmuxd | <=1.0.10 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 | |
SUSE openSUSE | =42.1 | |
openSUSE libeconf | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-5104 is classified as medium, due to the risk of local network exposure.
To fix CVE-2016-5104, update the libimobiledevice and libusbmuxd libraries to versions 1.2.1 and 1.0.11 or later.
CVE-2016-5104 affects users of libimobiledevice and libusbmuxd on Ubuntu and openSUSE systems.
CVE-2016-5104 exposes an iOS device to unauthorized access from local network attackers.
A temporary workaround for CVE-2016-5104 is to restrict access to the affected services using firewall rules.