Vulnerability Name: | CVE-2017-2476 (CCN-124037) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-12-01 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2017-03-28 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-03-25 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-2476 Source: BID Type: Third Party Advisory, VDB Entry 97130 Source: CCN Type: BID-97130 WebKit Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1038137 Source: MISC Type: Exploit, Third Party Advisory https://bugs.chromium.org/p/project-zero/issues/detail?id=1114 Source: XF Type: UNKNOWN apple-safari-cve20172476-code-exec(124037) Source: CCN Type: Packet Storm Security [04-10-2017] WebKit WebCore::toJS Use-After-Free Source: GENTOO Type: Third Party Advisory GLSA-201706-15 Source: CCN Type: Apple security document HT207600 About the security content of Safari 10.1 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207600 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207601 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207617 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [04-04-2017] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 41814 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |