ID CVE-2017-2409
Summary An issue was discovered in certain Apple products. macOS before 10.12.4 is affected. The issue involves the "Menus" component. It allows attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted app.
References
Vulnerable Configurations
  • Apple Mac OS X 10.12.3
    cpe:2.3:o:apple:mac_os_x:10.12.3
CVSS
Base: 5.8 (as of 06-04-2017 - 14:11)
Impact:
Exploitability:
CWE CWE-125
CAPEC
  • Overread Buffers
    An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE PARTIAL
nessus via4
NASL family MacOS X Local Security Checks
NASL id MACOS_10_12_4.NASL
description The remote host is running a version of macOS that is 10.12.x prior to 10.12.4. It is, therefore, affected by multiple vulnerabilities in multiple components, some of which are remote code execution vulnerabilities. An unauthenticated, remote attacker can exploit these remote code execution vulnerabilities by convincing a user to visit a specially crafted website, resulting in the execution of arbitrary code in the context of the current user. The affected components are as follows : - apache - apache_mod_php - AppleGraphicsPowerManagement - AppleRAID - Audio - Bluetooth - Carbon - CoreGraphics - CoreMedia - CoreText - curl - EFI - FinderKit - FontParser - HTTPProtocol - Hypervisor - iBooks - ImageIO - Intel Graphics Driver - IOATAFamily - IOFireWireAVC - IOFireWireFamily - Kernel - Keyboards - libarchive - libc++abi - LibreSSL - MCX Client - Menus - Multi-Touch - OpenSSH - OpenSSL - Printing - python - QuickTime - Security - SecurityFoundation - sudo - System Integrity Protection - tcpdump - tiffutil - WebKit
last seen 2019-02-21
modified 2018-07-14
plugin id 99134
published 2017-03-31
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=99134
title macOS 10.12.x < 10.12.4 Multiple Vulnerabilities (httpoxy)
refmap via4
bid 97140
confirm https://support.apple.com/HT207615
sectrack 1038138
Last major update 06-04-2017 - 14:41
Published 01-04-2017 - 21:59
Last modified 11-07-2017 - 21:29
Back to Top