Vulnerability Name: | CVE-2017-2544 (CCN-126104) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-12-01 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2017-05-10 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-07-08 | ||||||||||||||||||||||||||||||||||||||||
Summary: | An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. Safari before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-2544 Source: BID Type: Third Party Advisory, VDB Entry 98474 Source: CCN Type: BID-98474 Apple iOS and Safari Multiple Security Vulnerabilities Source: SECTRACK Type: UNKNOWN 1038487 Source: XF Type: UNKNOWN apple-cve20172544-code-exec(126104) Source: GENTOO Type: UNKNOWN GLSA-201706-15 Source: CCN Type: Apple security document HT207798 About the security content of iOS 10.3.2 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207798 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT207804 Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-2544 Source: CCN Type: ZDI-17-350 (Pwn2Own) Apple Safari Array concat Integer Overflow Remote Code Execution Vulnerability | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |