Vulnerability Name: | CVE-2017-13791 (CCN-134331) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-10-31 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2017-10-31 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-03-22 | ||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-13791 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1039703 Source: XF Type: UNKNOWN apple-safari-cve201713791-code-exec(134331) Source: CCN Type: Packet Storm Security [11-25-2017] WebKit WebCore::FormSubmission::create Use-After-Free Source: GENTOO Type: Third Party Advisory GLSA-201712-01 Source: CCN Type: Apple security document HT208222 About the security content of iOS 11.1 Source: CCN Type: Apple security document HT208223 About the security content of Safari 11.0.1 Source: CCN Type: Apple security document HT208224 About the security content of iTunes 12.7.1 for Windows Source: CCN Type: Apple security document HT208225 About the security content of iCloud for Windows 7.1 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208219 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208222 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208223 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208224 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208225 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [11-22-2017] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 43176 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |