ArchLinux: 201706-5: libusbmuxd: access restriction bypass
Summary
The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers on the local network to bypass intended access restrictions and communicate with services on affected devices by connecting to an IPv4 TCP socket.
Resolution
Upgrade to 1.0.10-2.
# pacman -Syu "libusbmuxd>=1.0.10-2"
The problem has been fixed upstream but no release is available yet.
References
https://git.archlinux.org/svntogit/packages.git/tree/trunk/CVE-2016-5104.patch?h=packages/libusbmuxd&id=c83d2655d67eb78375b5c3173020b79c9751bb1d https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196 http://www.openwall.com/lists/oss-security/2016/05/26/6 https://security.archlinux.org/CVE-2016-5104
Workaround
None.