Vulnerability Name: | CVE-2017-13865 (CCN-135947) | ||||||||||||
Assigned: | 2017-12-02 | ||||||||||||
Published: | 2017-12-02 | ||||||||||||
Updated: | 2019-03-08 | ||||||||||||
Summary: | An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. | ||||||||||||
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) 5.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C)
5.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-13865 Source: BID Type: Third Party Advisory, VDB Entry 102100 Source: CCN Type: BID-102100 Apple iOS/WatchOS/tvOS/macOS Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1039952 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1039953 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1039966 Source: XF Type: UNKNOWN apple-macos-cve201713865-info-disc(135947) Source: CCN Type: Packet Storm Security [12-12-2017] XNU Kernel API Memory Disclosure Source: CCN Type: Apple security document HT208331 About the security content of macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, and Security Update 2017-005 El Capitan Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208325 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208327 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208331 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208334 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [12-11-2017] Source: EXPLOIT-DB Type: Third Party Advisory, VDB Entry 43321 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |