Vulnerability Name: | CVE-2017-2472 (CCN-123985) | ||||||||||||
Assigned: | 2016-12-01 | ||||||||||||
Published: | 2017-03-27 | ||||||||||||
Updated: | 2019-03-08 | ||||||||||||
Summary: | An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "Kernel" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-416 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-2472 Source: BID Type: Third Party Advisory, VDB Entry 97137 Source: CCN Type: BID-97137 Apple iOS/tvOS/macOS/watchOS Multiple Security Vulnerabilities Source: SECTRACK Type: UNKNOWN 1038138 Source: XF Type: UNKNOWN apple-macos-cve20172472-priv-esc(123985) Source: CCN Type: Packet Storm Security [04-09-2017] MacOS posix_spawn Use-After-Free Source: CCN Type: Apple security document HT207615 About the security content of macOS Sierra 10.12.4, Security Update 2017-001 El Capitan, and Security Update 2017-001 Yosemite Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207601 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207602 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207615 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207617 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [04-04-2017] Source: EXPLOIT-DB Type: UNKNOWN 41791 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |