Researchers have identified several remote code execution vulnerabilities in iOS and OS X that could allow malicious hackers to compromise Apple devices using specially crafted image files.
Apple patched tens of vulnerabilities in OS X and iOS this week, including four security holes identified by experts at Cisco Talos. The most serious of the issues is CVE-2016-4631, which affects the ImageIO component in OS X 10.11.5 and prior, and iOS 9.3.2 and prior. It also impacts the watchOS and tvOS operating systems, which are based on iOS.
According to Cisco, the flaw is related to how ImageIO processes tiled TIFF (Tagged Image File Format) files. An attacker can exploit the vulnerability for arbitrary code execution by sending the targeted user a specially crafted image file that triggers a heap-based buffer overflow.
The vulnerability poses a serious threat due to the large number of affected devices and the wide range of potential attack vectors. Researchers said an attacker can exploit the weakness by delivering malicious TIFF files via iMessages, MMS messages, websites and other applications that use ImageIO for processing images. Experts warned that in some cases the exploit might not require any user interaction as some applications render images automatically when received.
Another arbitrary code execution flaw that affects both iOS and OS X is CVE-2016-4637, which exists in the CoreGraphics component. Cisco said the vulnerability is related to how the height property in the header of a BMP file is handled. An attacker can craft a special BMP file that triggers an out-of-bounds write when opened in an app that uses CoreGraphics.
Of the issues patched this week in OS X El Capitan 10.11.6, Cisco Talos researchers have been credited for two other graphics-related vulnerabilities. The security holes, tracked as CVE-2016-4629 and CVE-2016-4630, exist in ImageIO and they can be exploited to execute arbitrary code using OpenERX, an HDR image file format developed by Industrial Light & Magic for the visual effects industry.
Cisco has also disclosed CVE-2016-1850, an Apple SceneKit flaw that was patched in May with the release of OS X 10.11.5. The weakness can be leveraged by a remote attacker to execute code by using specially crafted Digital Asset Exchange or Collaborative Design Activity files.
Related Reading: Apple Wants All iOS Apps to Use HTTPS by 2017
Related Reading: Apple Patches RCE Flaw in AirPort Routers
Related Reading: Apple Pulls Jailbreak Detection App from App Store

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- Apple Denies Helping US Government Hack Russian iPhones
- Zero-Day in MOVEit File Transfer Software Exploited to Steal Data From Organizations
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Organizations Warned of Backdoor Feature in Hundreds of Gigabyte Motherboards
Latest News
- In Other News: Government Use of Spyware, New Industrial Security Tools, Japan Router Hack
- OpenAI Unveils Million-Dollar Cybersecurity Grant Program
- Galvanick Banks $10 Million for Industrial XDR Technology
- Information of 2.5M People Stolen in Ransomware Attack at Massachusetts Health Insurer
- US, South Korea Detail North Korea’s Social Engineering Techniques
- High-Severity Vulnerabilities Patched in Splunk Enterprise
- Idaho Hospitals Working to Resume Full Operations After Cyberattack
- Enzo Biochem Ransomware Attack Exposes Information of 2.5M Individuals
