Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-13807 (GCVE-0-2017-13807)
Vulnerability from cvelistv5
- n/a
URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T19:13:39.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT208221" }, { "name": "1039710", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039710" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-10-31T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \"Audio\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-13T10:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT208221" }, { "name": "1039710", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039710" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2017-13807", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \"Audio\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208221" }, { "name": "1039710", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039710" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2017-13807", "datePublished": "2017-11-13T03:00:00", "dateReserved": "2017-08-30T00:00:00", "dateUpdated": "2024-08-05T19:13:39.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-13807\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2017-11-13T03:29:01.113\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \\\"Audio\\\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema en algunos productos Apple. Se han visto afectadas las versiones de macOS anteriores a la 10.13.1. El problema afecta al componente \\\"Audio\\\". Permite que atacantes remotos ejecuten c\u00f3digo arbitrario o provoquen una denegaci\u00f3n de servicio (consumo de memoria) mediante un archivo QuickTime manipulado.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.13.0\",\"matchCriteriaId\":\"7423593E-2B13-4369-A525-377AF02C01C9\"}]}]}],\"references\":[{\"url\":\"http://www.securitytracker.com/id/1039710\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1039710\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://support.apple.com/HT208221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
CERTFR-2017-AVI-385
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Apple . Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Apple | N/A | iOS versions antérieures à 11.1 | ||
Apple | N/A | watchOS versions antérieures à 4.1 | ||
Apple | macOS | macOS Sierra versions sans le correctif de sécurité 2017-001 | ||
Apple | N/A | tvOS versions antérieures à 11.1 | ||
Apple | macOS | macOS El Capitan sans le correctif de sécurité 2017-004 | ||
Apple | N/A | iTunes versions antérieures à 12.7.1 sur Windows | ||
Apple | N/A | iCloud pour Windows versions antérieures à 7.1 | ||
Apple | Safari | Safari versions antérieures à 11.0.1 | ||
Apple | macOS | macOS High Sierra versions antérieures à 10.13.1 |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "iOS versions ant\u00e9rieures \u00e0 11.1", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "watchOS versions ant\u00e9rieures \u00e0 4.1", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "macOS Sierra versions sans le correctif de s\u00e9curit\u00e9 2017-001", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "tvOS versions ant\u00e9rieures \u00e0 11.1", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "macOS El Capitan sans le correctif de s\u00e9curit\u00e9 2017-004", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iTunes versions ant\u00e9rieures \u00e0 12.7.1 sur Windows", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 7.1", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Safari versions ant\u00e9rieures \u00e0 11.0.1", "product": { "name": "Safari", "vendor": { "name": "Apple", "scada": false } } }, { "description": "macOS High Sierra versions ant\u00e9rieures \u00e0 10.13.1", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2017-13802", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13802" }, { "name": "CVE-2017-13818", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13818" }, { "name": "CVE-2017-13052", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13052" }, { "name": "CVE-2017-12993", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12993" }, { "name": "CVE-2017-13018", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13018" }, { "name": "CVE-2017-13043", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13043" }, { "name": "CVE-2017-3169", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3169" }, { "name": "CVE-2017-9789", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9789" }, { "name": "CVE-2017-7659", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7659" }, { "name": "CVE-2016-4736", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4736" }, { "name": "CVE-2017-13050", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13050" }, { "name": "CVE-2017-13816", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13816" }, { "name": "CVE-2017-13798", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13798" }, { "name": "CVE-2017-11108", "url": "https://www.cve.org/CVERecord?id=CVE-2017-11108" }, { "name": "CVE-2017-13017", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13017" }, { "name": "CVE-2017-13831", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13831" }, { "name": "CVE-2017-11543", "url": "https://www.cve.org/CVERecord?id=CVE-2017-11543" }, { "name": "CVE-2017-13790", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13790" }, { "name": "CVE-2017-13000", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13000" }, { "name": "CVE-2017-13807", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13807" }, { "name": "CVE-2017-13843", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13843" }, { "name": "CVE-2017-13055", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13055" }, { "name": "CVE-2017-7668", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7668" }, { "name": "CVE-2017-13041", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13041" }, { "name": "CVE-2017-12902", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12902" }, { "name": "CVE-2017-13834", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13834" }, { "name": "CVE-2017-13007", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13007" }, { "name": "CVE-2017-13687", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13687" }, { "name": "CVE-2017-13078", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13078" }, { "name": "CVE-2017-12986", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12986" }, { "name": "CVE-2017-13821", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13821" }, { "name": "CVE-2017-13033", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13033" }, { "name": "CVE-2017-13817", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13817" }, { "name": "CVE-2017-13799", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13799" }, { "name": "CVE-2017-12901", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12901" }, { "name": "CVE-2017-13832", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13832" }, { "name": "CVE-2017-13011", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13011" }, { "name": "CVE-2017-13046", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13046" }, { "name": "CVE-2017-13840", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13840" }, { "name": "CVE-2017-12897", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12897" }, { "name": "CVE-2017-13809", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13809" }, { "name": "CVE-2017-13822", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13822" }, { "name": "CVE-2017-7113", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7113" }, { "name": "CVE-2017-13800", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13800" }, { "name": "CVE-2017-13786", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13786" }, { "name": "CVE-2017-13003", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13003" }, { "name": "CVE-2017-13815", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13815" }, { "name": "CVE-2017-13013", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13013" }, { "name": "CVE-2017-13001", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13001" }, { "name": "CVE-2017-13009", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13009" }, { "name": "CVE-2017-1000101", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000101" }, { "name": "CVE-2016-8740", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8740" }, { "name": "CVE-2017-13048", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13048" }, { "name": "CVE-2017-13054", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13054" }, { "name": "CVE-2017-13038", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13038" }, { "name": "CVE-2017-13841", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13841" }, { "name": "CVE-2017-13010", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13010" }, { "name": "CVE-2017-12990", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12990" }, { "name": "CVE-2017-13783", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13783" }, { "name": "CVE-2017-13047", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13047" }, { "name": "CVE-2017-12991", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12991" }, { "name": "CVE-2017-13805", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13805" }, { "name": "CVE-2017-13811", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13811" }, { "name": "CVE-2017-13849", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13849" }, { "name": "CVE-2017-13032", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13032" }, { "name": "CVE-2017-13801", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13801" }, { "name": "CVE-2017-13051", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13051" }, { "name": "CVE-2017-13036", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13036" }, { "name": "CVE-2017-9788", "url": "https://www.cve.org/CVERecord?id=CVE-2017-9788" }, { "name": "CVE-2017-13844", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13844" }, { "name": "CVE-2016-2161", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2161" }, { "name": "CVE-2017-13795", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13795" }, { "name": "CVE-2017-13690", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13690" }, { "name": "CVE-2017-13838", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13838" }, { "name": "CVE-2017-11542", "url": "https://www.cve.org/CVERecord?id=CVE-2017-11542" }, { "name": "CVE-2017-13842", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13842" }, { "name": "CVE-2017-12997", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12997" }, { "name": "CVE-2017-13045", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13045" }, { "name": "CVE-2017-13026", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13026" }, { "name": "CVE-2017-13785", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13785" }, { "name": "CVE-2016-5387", "url": "https://www.cve.org/CVERecord?id=CVE-2016-5387" }, { "name": "CVE-2017-13796", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13796" }, { "name": "CVE-2017-13782", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13782" }, { "name": "CVE-2017-13784", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13784" }, { "name": "CVE-2017-13042", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13042" }, { "name": "CVE-2017-12992", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12992" }, { "name": "CVE-2017-13027", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13027" }, { "name": "CVE-2017-13034", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13034" }, { "name": "CVE-2017-13794", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13794" }, { "name": "CVE-2017-13015", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13015" }, { "name": "CVE-2017-13725", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13725" }, { "name": "CVE-2017-13819", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13819" }, { "name": "CVE-2017-13044", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13044" }, { "name": "CVE-2017-12900", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12900" }, { "name": "CVE-2017-12994", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12994" }, { "name": "CVE-2017-12998", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12998" }, { "name": "CVE-2017-13029", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13029" }, { "name": "CVE-2017-13037", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13037" }, { "name": "CVE-2017-13788", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13788" }, { "name": "CVE-2017-7132", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7132" }, { "name": "CVE-2017-13810", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13810" }, { "name": "CVE-2017-13039", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13039" }, { "name": "CVE-2017-13791", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13791" }, { "name": "CVE-2017-13023", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13023" }, { "name": "CVE-2017-13020", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13020" }, { "name": "CVE-2017-13021", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13021" }, { "name": "CVE-2017-3167", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3167" }, { "name": "CVE-2017-12896", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12896" }, { "name": "CVE-2017-13824", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13824" }, { "name": "CVE-2017-13049", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13049" }, { "name": "CVE-2017-12999", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12999" }, { "name": "CVE-2017-13836", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13836" }, { "name": "CVE-2017-13823", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13823" }, { "name": "CVE-2017-13846", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13846" }, { "name": "CVE-2017-12988", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12988" }, { "name": "CVE-2017-13789", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13789" }, { "name": "CVE-2017-12985", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12985" }, { "name": "CVE-2017-12899", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12899" }, { "name": "CVE-2017-7679", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7679" }, { "name": "CVE-2017-13014", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13014" }, { "name": "CVE-2017-12894", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12894" }, { "name": "CVE-2017-13804", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13804" }, { "name": "CVE-2017-13024", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13024" }, { "name": "CVE-2017-13004", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13004" }, { "name": "CVE-2017-12996", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12996" }, { "name": "CVE-2017-13830", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13830" }, { "name": "CVE-2017-12893", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12893" }, { "name": "CVE-2017-13019", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13019" }, { "name": "CVE-2017-13030", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13030" }, { "name": "CVE-2017-13808", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13808" }, { "name": "CVE-2017-13813", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13813" }, { "name": "CVE-2017-1000100", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000100" }, { "name": "CVE-2017-13053", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13053" }, { "name": "CVE-2017-13040", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13040" }, { "name": "CVE-2017-13689", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13689" }, { "name": "CVE-2017-11103", "url": "https://www.cve.org/CVERecord?id=CVE-2017-11103" }, { "name": "CVE-2017-13005", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13005" }, { "name": "CVE-2017-13793", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13793" }, { "name": "CVE-2017-13814", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13814" }, { "name": "CVE-2017-12987", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12987" }, { "name": "CVE-2017-13826", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13826" }, { "name": "CVE-2017-11541", "url": "https://www.cve.org/CVERecord?id=CVE-2017-11541" }, { "name": "CVE-2017-13025", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13025" }, { "name": "CVE-2017-13828", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13828" }, { "name": "CVE-2017-13688", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13688" }, { "name": "CVE-2017-13820", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13820" }, { "name": "CVE-2017-12995", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12995" }, { "name": "CVE-2017-13792", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13792" }, { "name": "CVE-2017-13031", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13031" }, { "name": "CVE-2017-13028", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13028" }, { "name": "CVE-2017-13825", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13825" }, { "name": "CVE-2016-8743", "url": "https://www.cve.org/CVERecord?id=CVE-2016-8743" }, { "name": "CVE-2017-13803", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13803" }, { "name": "CVE-2017-13006", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13006" }, { "name": "CVE-2017-12895", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12895" }, { "name": "CVE-2017-13812", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13812" }, { "name": "CVE-2017-13022", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13022" }, { "name": "CVE-2017-13012", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13012" }, { "name": "CVE-2017-13002", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13002" }, { "name": "CVE-2017-13035", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13035" }, { "name": "CVE-2017-12989", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12989" }, { "name": "CVE-2017-13077", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13077" }, { "name": "CVE-2017-13016", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13016" }, { "name": "CVE-2017-13080", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13080" }, { "name": "CVE-2017-12898", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12898" }, { "name": "CVE-2017-13008", "url": "https://www.cve.org/CVERecord?id=CVE-2017-13008" } ], "initial_release_date": "2017-11-02T00:00:00", "last_revision_date": "2017-11-02T00:00:00", "links": [], "reference": "CERTFR-2017-AVI-385", "revisions": [ { "description": "Version initiale", "revision_date": "2017-11-02T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple\n. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208225 du 31 octobre 2017", "url": "https://support.apple.com/en-us/HT208225" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208222 du 31 octobre 2017", "url": "https://support.apple.com/en-us/HT208222" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208219 du 31 octobre 2017", "url": "https://support.apple.com/en-us/HT208219" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208223 du 31 octobre 2017", "url": "https://support.apple.com/en-us/HT208223" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208220 du 31 octobre 2017", "url": "https://support.apple.com/en-us/HT208220" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208221 du 31 octobre 2017", "url": "https://support.apple.com/en-us/HT208221" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT208224 du 31 octobre 2017", "url": "https://support.apple.com/en-us/HT208224" } ] }
ghsa-pmgv-qqwr-pchg
Vulnerability from github
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file.
{ "affected": [], "aliases": [ "CVE-2017-13807" ], "database_specific": { "cwe_ids": [ "CWE-20" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-11-13T03:29:00Z", "severity": "HIGH" }, "details": "An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \"Audio\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file.", "id": "GHSA-pmgv-qqwr-pchg", "modified": "2022-05-17T00:21:34Z", "published": "2022-05-17T00:21:34Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-13807" }, { "type": "WEB", "url": "https://support.apple.com/HT208221" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1039710" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201711-0458
Vulnerability from variot
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Audio" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. A security vulnerability exists in the Audio component of Apple macOS High Sierra prior to 10.13.1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2017-10-31-8 Additional information for APPLE-SA-2017-09-25-1 macOS High Sierra 10.13
macOS High Sierra 10.13 addresses the following:
802.1X Available for: OS X Mountain Lion 10.8 and later Impact: An attacker may be able to exploit weaknesses in TLS 1.0 Description: A protocol security issue was addressed by enabling TLS 1.1 and TLS 1.2. CVE-2017-13832: an anonymous researcher Entry added October 31, 2017
apache Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in Apache Description: Multiple issues were addressed by updating to version 2.4.27. CVE-2017-3167 CVE-2017-3169 CVE-2017-7659 CVE-2017-7668 CVE-2017-7679 CVE-2017-9788 CVE-2017-9789 Entry added October 31, 2017
apache Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in Apache Description: Multiple issues existed in Apache. These were addressed by updating Apache to version 2.4.25. CVE-2016-736 CVE-2016-2161 CVE-2016-5387 CVE-2016-8740 CVE-2016-8743 Entry added October 31, 2017
AppleScript Available for: OS X Mountain Lion 10.8 and later Impact: Decompiling an AppleScript with osadecompile may lead to arbitrary code execution Description: A validation issue was addressed with improved input sanitization. CVE-2017-13809: an anonymous researcher Entry added October 31, 2017
Application Firewall Available for: OS X Lion v10.8 and later Impact: A previously denied application firewall setting may take effect after upgrading Description: An upgrade issue existed in the handling of firewall settings. This issue was addressed through improved handling of firewall settings during upgrades. CVE-2017-7084: an anonymous researcher
AppSandbox Available for: OS X Lion v10.8 and later Impact: An application may be able to cause a denial of service Description: Multiple denial of service issues were addressed through improved memory handling. CVE-2017-7074: Daniel Jalkut of Red Sweater Software
ATS Available for: OS X Mountain Lion 10.8 and later Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: A memory corruption issue was addressed with improved input validation. CVE-2017-13820: John Villamil, Doyensec Entry added October 31, 2017
Audio Available for: OS X Mountain Lion 10.8 and later Impact: Parsing a maliciously crafted QuickTime file may lead to an unexpected application termination or arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-13807: Yangkang (@dnpushme) of Qihoo 360 Qex Team Entry added October 31, 2017
Captive Network Assistant Available for: OS X Lion v10.8 and later Impact: A local user may unknowingly send a password unencrypted over the network Description: The security state of the captive portal browser was not obvious. This issue was addressed with improved visibility of the captive portal browser security state. CVE-2017-7143: an anonymous researcher
CFNetwork Proxies Available for: OS X Lion v10.8 and later Impact: An attacker in a privileged network position may be able to cause a denial of service Description: Multiple denial of service issues were addressed through improved memory handling. CVE-2017-7083: Abhinav Bansal of Zscaler Inc.
CFString Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13821: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
CoreAudio Available for: OS X Lion v10.8 and later Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed by updating to Opus version 1.1.4. CVE-2017-0381: V.E.O (@VYSEa) of Mobile Threat Research Team, Trend Micro
CoreText Available for: OS X Mountain Lion 10.8 and later Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-13825: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
Directory Utility Available for: OS X Lion v10.8 and later Impact: A local attacker may be able to determine the Apple ID of the owner of the computer Description: A permissions issue existed in the handling of the Apple ID. This issue was addressed with improved access controls. CVE-2017-7138: an anonymous researcher
file Available for: OS X Lion v10.8 and later Impact: Multiple issues in file Description: Multiple issues were addressed by updating to version 5.30. CVE-2017-7121: found by OSS-Fuzz CVE-2017-7122: found by OSS-Fuzz CVE-2017-7123: found by OSS-Fuzz CVE-2017-7124: found by OSS-Fuzz CVE-2017-7125: found by OSS-Fuzz CVE-2017-7126: found by OSS-Fuzz
file Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in file Description: Multiple issues were addressed by updating to version 5.31. CVE-2017-13815 Entry added October 31, 2017
Fonts Available for: OS X Mountain Lion 10.8 and later Impact: Rendering untrusted text may lead to spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2017-13828: an anonymous researcher Entry added October 31, 2017
fsck_msdos Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13811: an anonymous researcher Entry added October 31, 2017
HelpViewer Available for: OS X Mountain Lion 10.8 and later Impact: A quarantined HTML file may execute arbitrary JavaScript cross-origin Description: A cross-site scripting issue existed in HelpViewer. This issue was addressed by removing the affected file. CVE-2017-13819: an anonymous researcher Entry added October 31, 2017
HFS Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13830: Sergej Schumilo of Ruhr-University Bochum Entry added October 31, 2017
ImageIO Available for: OS X Mountain Lion 10.8 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved input validation. CVE-2017-13814: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
ImageIO Available for: OS X Mountain Lion 10.8 and later Impact: Processing a maliciously crafted image may lead to a denial of service Description: An information disclosure issue existed in the processing of disk images. This issue was addressed through improved memory management. CVE-2017-13831: an anonymous researcher Entry added October 31, 2017
Installer Available for: OS X Mountain Lion 10.8 and later Impact: A malicious application may be able to access the FileVault unlock key Description: This issue was addressed by removing additional entitlements. CVE-2017-13837: Patrick Wardle of Synack Entry added October 31, 2017
IOFireWireFamily Available for: OS X Lion v10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-7077: Brandon Azad
IOFireWireFamily Available for: OS X Lion v10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-7119: Xiaolong Bai, Min (Spark) Zheng of Alibaba Inc., Benjamin Gnahm (@mitp0sh) of PDX
Kernel Available for: OS X Lion v10.8 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-7114: Alex Plaskett of MWR InfoSecurity
Kernel Available for: OS X Mountain Lion 10.8 and later Impact: A local user may be able to leak sensitive user information Description: A permissions issue existed in kernel packet counters. This issue was addressed through improved permission validation. CVE-2017-13810: an anonymous researcher Entry added October 31, 2017
Kernel Available for: OS X Mountain Lion 10.8 and later Impact: A local user may be able to read kernel memory Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed through improved input validation. CVE-2017-13817: Maxime Villard (m00nbsd) Entry added October 31, 2017
Kernel Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13818: The UK's National Cyber Security Centre (NCSC) CVE-2017-13836: an anonymous researcher, an anonymous researcher CVE-2017-13841: an anonymous researcher CVE-2017-13840: an anonymous researcher CVE-2017-13842: an anonymous researcher CVE-2017-13782: Kevin Backhouse of Semmle Ltd. Entry added October 31, 2017
Kernel Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13843: an anonymous researcher Entry added October 31, 2017
Kernel Available for: OS X Mountain Lion 10.8 and later Impact: Processing a malformed mach binary may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved validation. CVE-2017-13834: Maxime Villard (m00nbsd) Entry added October 31, 2017
kext tools Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A logic error in kext loading was addressed with improved state handling. CVE-2017-13827: an anonymous researcher Entry added October 31, 2017
libarchive Available for: OS X Mountain Lion 10.8 and later Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-13813: found by OSS-Fuzz CVE-2017-13816: found by OSS-Fuzz Entry added October 31, 2017
libarchive Available for: OS X Mountain Lion 10.8 and later Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: Multiple memory corruption issues existed in libarchive. These issues were addressed through improved input validation. CVE-2017-13812: found by OSS-Fuzz Entry added October 31, 2017
libarchive Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2016-4736: Proteas of Qihoo 360 Nirvan Team Entry added October 31, 2017
libc Available for: OS X Lion v10.8 and later Impact: A remote attacker may be able to cause a denial-of-service Description: A resource exhaustion issue in glob() was addressed through an improved algorithm. CVE-2017-7086: Russ Cox of Google
libc Available for: OS X Lion v10.8 and later Impact: An application may be able to cause a denial of service Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-1000373
libexpat Available for: OS X Lion v10.8 and later Impact: Multiple issues in expat Description: Multiple issues were addressed by updating to version 2.2.1 CVE-2016-9063 CVE-2017-9233
Mail Available for: OS X Lion v10.8 and later Impact: The sender of an email may be able to determine the IP address of the recipient Description: Turning off "Load remote content in messages" did not apply to all mailboxes. This issue was addressed with improved setting propagation. CVE-2017-7141: an anonymous researcher
Mail Drafts Available for: OS X Lion v10.8 and later Impact: An attacker with a privileged network position may be able to intercept mail contents Description: An encryption issue existed in the handling of mail drafts. This issue was addressed with improved handling of mail drafts meant to be sent encrypted. CVE-2017-7078: an anonymous researcher, an anonymous researcher, an anonymous researcher
ntp Available for: OS X Lion v10.8 and later Impact: Multiple issues in ntp Description: Multiple issues were addressed by updating to version 4.2.8p10 CVE-2017-6451: Cure53 CVE-2017-6452: Cure53 CVE-2017-6455: Cure53 CVE-2017-6458: Cure53 CVE-2017-6459: Cure53 CVE-2017-6460: Cure53 CVE-2017-6462: Cure53 CVE-2017-6463: Cure53 CVE-2017-6464: Cure53 CVE-2016-9042: Matthew Van Gundy of Cisco
Open Scripting Architecture Available for: OS X Mountain Lion 10.8 and later Impact: Decompiling an AppleScript with osadecompile may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13824: an anonymous researcher Entry added October 31, 2017
PCRE Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in pcre Description: Multiple issues were addressed by updating to version 8.40. CVE-2017-13846 Entry added October 31, 2017
Postfix Available for: OS X Mountain Lion 10.8 and later Impact: Multiple issues in Postfix Description: Multiple issues were addressed by updating to version 3.2.2. CVE-2017-13826: an anonymous researcher Entry added October 31, 2017
Quick Look Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13822: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
Quick Look Available for: OS X Mountain Lion 10.8 and later Impact: Parsing a maliciously crafted office document may lead to an unexpected application termination or arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-7132: Australian Cyber Security Centre a Australian Signals Directorate Entry added October 31, 2017
QuickTime Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13823: an anonymous researcher Entry added October 31, 2017
Remote Management Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13808: an anonymous researcher Entry added October 31, 2017
Sandbox Available for: OS X Mountain Lion 10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13838: an anonymous researcher Entry added October 31, 2017
Screen Lock Available for: OS X Lion v10.8 and later Impact: Application Firewall prompts may appear over Login Window Description: A window management issue was addressed through improved state management. CVE-2017-7082: Tim Kingman
Security Available for: OS X Lion v10.8 and later Impact: A revoked certificate may be trusted Description: A certificate validation issue existed in the handling of revocation data. This issue was addressed through improved validation. CVE-2017-7080: Sven Driemecker of adesso mobile solutions gmbh, Rune Darrud (@theflyingcorpse) of BA|rum kommune, an anonymous researcher, an anonymous researcher
Spotlight Available for: OS X Mountain Lion 10.8 and later Impact: Spotlight may display results for files not belonging to the user Description: An access issue existed in Spotlight. This issue was addressed through improved access restrictions. CVE-2017-13839: an anonymous researcher Entry added October 31, 2017
SQLite Available for: OS X Lion v10.8 and later Impact: Multiple issues in SQLite Description: Multiple issues were addressed by updating to version 3.19.3. CVE-2017-10989: found by OSS-Fuzz CVE-2017-7128: found by OSS-Fuzz CVE-2017-7129: found by OSS-Fuzz CVE-2017-7130: found by OSS-Fuzz
SQLite Available for: OS X Lion v10.8 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-7127: an anonymous researcher
WebKit Available for: OS X Lion v10.8 and later Impact: A malicious website may be able to track users in Safari private browsing mode Description: A permissions issue existed in the handling of web browser cookies. This issue was addressed with improved restrictions. CVE-2017-7144: an anonymous researcher
zlib Available for: OS X Lion v10.8 and later Impact: Multiple issues in zlib Description: Multiple issues were addressed by updating to version 1.2.11. CVE-2016-9840 CVE-2016-9841 CVE-2016-9842 CVE-2016-9843
Installation note:
macOS High Sierra 10.13 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAln4u8MpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEaV7BAA oPmo5pAA/HORVC3jl7tvStUpsUUiiez204FhuoVFsvHq0w7eYjsYDilzw7f6yveV e9Xhlbz7jhFpa1SXQhtiK5SSA1aJqhXIzZPSSf4ex/6qBZCSUrAZi1vC05TuQFi2 bvZ9N2mr3Mwd4GlxN7XZ6DLi3BqQPaKIavmuxOLkUSCpkwj9npS1oPDvMCP8DX4q goywFq4QOgvSJnohH/G8IGSm2Txy/IES68vvxdPRUi3IzjGM7E88QHkwKBDiqZRG ozuhx8Zs+cEh8yIzLO2UoTJe5gVgz1si7J4tgCPTT65r3Uf2sizkOMMdX8PHmCCi WTs3adVyJgC8nNql24cvPpJ4UM7bia0adzNf7cjTf7KKtVomIzR6IFaa+V737a+A jESOB5J0iy1oqzfGN8/zf724N+rc5jp/QejM6tTvcNuc807Z4jVpR3CEr+GkMENz Hq1Vr06gnBolmwnwlhCHujYwOpJXJ2xllQavNoe6r57XTYid1rjuRG5KXNWPlEgw GyoB8rTLY+BzLszUtrQlhh5QXa8WaQLg0uPJJDHH3DUM7jEXRBrk7nhrz4z2qq7S j1hlkhZbW2HuYg9URLhgYtkMgVjbTneZkWhEqER+AIbqFKdwTkuNgu5sHnWCrXG0 N+hmcqhXbgblWwiT0ma/I7Yn0b7O9g9stN88cL9cr3I= =887+ -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0458", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.13.0" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.12.6" }, { "model": "mac os x", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "10.13.0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010378" }, { "db": "CNNVD", "id": "CNNVD-201709-167" }, { "db": "NVD", "id": "CVE-2017-13807" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010378" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "PACKETSTORM", "id": "144862" } ], "trust": 0.1 }, "cve": "CVE-2017-13807", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-13807", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-104466", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-13807", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-13807", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-13807", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201709-167", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-104466", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-104466" }, { "db": "JVNDB", "id": "JVNDB-2017-010378" }, { "db": "CNNVD", "id": "CNNVD-201709-167" }, { "db": "NVD", "id": "CVE-2017-13807" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \"Audio\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. A security vulnerability exists in the Audio component of Apple macOS High Sierra prior to 10.13.1. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-10-31-8\nAdditional information for APPLE-SA-2017-09-25-1\nmacOS High Sierra 10.13\n\nmacOS High Sierra 10.13 addresses the following:\n\n802.1X\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An attacker may be able to exploit weaknesses in TLS 1.0\nDescription: A protocol security issue was addressed by enabling TLS\n1.1 and TLS 1.2. \nCVE-2017-13832: an anonymous researcher\nEntry added October 31, 2017\n\napache\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Multiple issues in Apache\nDescription: Multiple issues were addressed by updating to version\n2.4.27. \nCVE-2017-3167\nCVE-2017-3169\nCVE-2017-7659\nCVE-2017-7668\nCVE-2017-7679\nCVE-2017-9788\nCVE-2017-9789\nEntry added October 31, 2017\n\napache\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Multiple issues in Apache\nDescription: Multiple issues existed in Apache. These were addressed\nby updating Apache to version 2.4.25. \nCVE-2016-736\nCVE-2016-2161\nCVE-2016-5387\nCVE-2016-8740\nCVE-2016-8743\nEntry added October 31, 2017\n\nAppleScript\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Decompiling an AppleScript with osadecompile may lead to\narbitrary code execution\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13809: an anonymous researcher\nEntry added October 31, 2017\n\nApplication Firewall\nAvailable for: OS X Lion v10.8 and later\nImpact: A previously denied application firewall setting may take\neffect after upgrading\nDescription: An upgrade issue existed in the handling of firewall\nsettings. This issue was addressed through improved handling of\nfirewall settings during upgrades. \nCVE-2017-7084: an anonymous researcher\n\nAppSandbox\nAvailable for: OS X Lion v10.8 and later\nImpact: An application may be able to cause a denial of service\nDescription: Multiple denial of service issues were addressed through\nimproved memory handling. \nCVE-2017-7074: Daniel Jalkut of Red Sweater Software\n\nATS\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Processing a maliciously crafted font may result in the\ndisclosure of process memory\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2017-13820: John Villamil, Doyensec\nEntry added October 31, 2017\n\nAudio\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Parsing a maliciously crafted QuickTime file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-13807: Yangkang (@dnpushme) of Qihoo 360 Qex Team\nEntry added October 31, 2017\n\nCaptive Network Assistant\nAvailable for: OS X Lion v10.8 and later\nImpact: A local user may unknowingly send a password unencrypted over\nthe network\nDescription: The security state of the captive portal browser was not\nobvious. This issue was addressed with improved visibility of the\ncaptive portal browser security state. \nCVE-2017-7143: an anonymous researcher\n\nCFNetwork Proxies\nAvailable for: OS X Lion v10.8 and later\nImpact: An attacker in a privileged network position may be able to\ncause a denial of service\nDescription: Multiple denial of service issues were addressed through\nimproved memory handling. \nCVE-2017-7083: Abhinav Bansal of Zscaler Inc. \n\nCFString\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13821: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nCoreAudio\nAvailable for: OS X Lion v10.8 and later\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed by updating to Opus\nversion 1.1.4. \nCVE-2017-0381: V.E.O (@VYSEa) of Mobile Threat Research Team, Trend\nMicro\n\nCoreText\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-13825: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nDirectory Utility\nAvailable for: OS X Lion v10.8 and later\nImpact: A local attacker may be able to determine the Apple ID of the\nowner of the computer\nDescription: A permissions issue existed in the handling of the Apple\nID. This issue was addressed with improved access controls. \nCVE-2017-7138: an anonymous researcher\n\nfile\nAvailable for: OS X Lion v10.8 and later\nImpact: Multiple issues in file\nDescription: Multiple issues were addressed by updating to version\n5.30. \nCVE-2017-7121: found by OSS-Fuzz\nCVE-2017-7122: found by OSS-Fuzz\nCVE-2017-7123: found by OSS-Fuzz\nCVE-2017-7124: found by OSS-Fuzz\nCVE-2017-7125: found by OSS-Fuzz\nCVE-2017-7126: found by OSS-Fuzz\n\nfile\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Multiple issues in file\nDescription: Multiple issues were addressed by updating to version\n5.31. \nCVE-2017-13815\nEntry added October 31, 2017\n\nFonts\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Rendering untrusted text may lead to spoofing\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2017-13828: an anonymous researcher\nEntry added October 31, 2017\n\nfsck_msdos\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13811: an anonymous researcher\nEntry added October 31, 2017\n\nHelpViewer\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: A quarantined HTML file may execute arbitrary JavaScript\ncross-origin\nDescription: A cross-site scripting issue existed in HelpViewer. This\nissue was addressed by removing the affected file. \nCVE-2017-13819: an anonymous researcher\nEntry added October 31, 2017\n\nHFS\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13830: Sergej Schumilo of Ruhr-University Bochum\nEntry added October 31, 2017\n\nImageIO\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed through improved\ninput validation. \nCVE-2017-13814: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nImageIO\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Processing a maliciously crafted image may lead to a denial\nof service\nDescription: An information disclosure issue existed in the\nprocessing of disk images. This issue was addressed through improved\nmemory management. \nCVE-2017-13831: an anonymous researcher\nEntry added October 31, 2017\n\nInstaller\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: A malicious application may be able to access the FileVault\nunlock key\nDescription: This issue was addressed by removing additional\nentitlements. \nCVE-2017-13837: Patrick Wardle of Synack\nEntry added October 31, 2017\n\nIOFireWireFamily\nAvailable for: OS X Lion v10.8 and later\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-7077: Brandon Azad\n\nIOFireWireFamily\nAvailable for: OS X Lion v10.8 and later\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-7119: Xiaolong Bai, Min (Spark) Zheng of Alibaba Inc.,\nBenjamin Gnahm (@mitp0sh) of PDX\n\nKernel\nAvailable for: OS X Lion v10.8 and later\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-7114: Alex Plaskett of MWR InfoSecurity\n\nKernel\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: A local user may be able to leak sensitive user information\nDescription: A permissions issue existed in kernel packet counters. \nThis issue was addressed through improved permission validation. \nCVE-2017-13810: an anonymous researcher\nEntry added October 31, 2017\n\nKernel\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: A local user may be able to read kernel memory\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. This was addressed through improved\ninput validation. \nCVE-2017-13817: Maxime Villard (m00nbsd)\nEntry added October 31, 2017\n\nKernel\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13818: The UK\u0027s National Cyber Security Centre (NCSC)\nCVE-2017-13836: an anonymous researcher, an anonymous researcher\nCVE-2017-13841: an anonymous researcher\nCVE-2017-13840: an anonymous researcher\nCVE-2017-13842: an anonymous researcher\nCVE-2017-13782: Kevin Backhouse of Semmle Ltd. \nEntry added October 31, 2017\n\nKernel\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13843: an anonymous researcher\nEntry added October 31, 2017\n\nKernel\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Processing a malformed mach binary may lead to arbitrary code\nexecution\nDescription: A memory corruption issue was addressed through improved\nvalidation. \nCVE-2017-13834: Maxime Villard (m00nbsd)\nEntry added October 31, 2017\n\nkext tools\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A logic error in kext loading was addressed with\nimproved state handling. \nCVE-2017-13827: an anonymous researcher\nEntry added October 31, 2017\n\nlibarchive\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Unpacking a maliciously crafted archive may lead to arbitrary\ncode execution\nDescription: A buffer overflow issue was addressed through improved\nmemory handling. \nCVE-2017-13813: found by OSS-Fuzz\nCVE-2017-13816: found by OSS-Fuzz\nEntry added October 31, 2017\n\nlibarchive\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Unpacking a maliciously crafted archive may lead to arbitrary\ncode execution\nDescription: Multiple memory corruption issues existed in libarchive. \nThese issues were addressed through improved input validation. \nCVE-2017-13812: found by OSS-Fuzz\nEntry added October 31, 2017\n\nlibarchive\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2016-4736: Proteas of Qihoo 360 Nirvan Team\nEntry added October 31, 2017\n\nlibc\nAvailable for: OS X Lion v10.8 and later\nImpact: A remote attacker may be able to cause a denial-of-service\nDescription: A resource exhaustion issue in glob() was addressed\nthrough an improved algorithm. \nCVE-2017-7086: Russ Cox of Google\n\nlibc\nAvailable for: OS X Lion v10.8 and later\nImpact: An application may be able to cause a denial of service\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-1000373\n\nlibexpat\nAvailable for: OS X Lion v10.8 and later\nImpact: Multiple issues in expat\nDescription: Multiple issues were addressed by updating to version\n2.2.1\nCVE-2016-9063\nCVE-2017-9233\n\nMail\nAvailable for: OS X Lion v10.8 and later\nImpact: The sender of an email may be able to determine the IP\naddress of the recipient\nDescription: Turning off \"Load remote content in messages\" did not\napply to all mailboxes. This issue was addressed with improved\nsetting propagation. \nCVE-2017-7141: an anonymous researcher\n\nMail Drafts\nAvailable for: OS X Lion v10.8 and later\nImpact: An attacker with a privileged network position may be able to\nintercept mail contents\nDescription: An encryption issue existed in the handling of mail\ndrafts. This issue was addressed with improved handling of mail\ndrafts meant to be sent encrypted. \nCVE-2017-7078: an anonymous researcher, an anonymous researcher, an\nanonymous researcher\n\nntp\nAvailable for: OS X Lion v10.8 and later\nImpact: Multiple issues in ntp\nDescription: Multiple issues were addressed by updating to version\n4.2.8p10\nCVE-2017-6451: Cure53\nCVE-2017-6452: Cure53\nCVE-2017-6455: Cure53\nCVE-2017-6458: Cure53\nCVE-2017-6459: Cure53\nCVE-2017-6460: Cure53\nCVE-2017-6462: Cure53\nCVE-2017-6463: Cure53\nCVE-2017-6464: Cure53\nCVE-2016-9042: Matthew Van Gundy of Cisco\n\nOpen Scripting Architecture\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Decompiling an AppleScript with osadecompile may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13824: an anonymous researcher\nEntry added October 31, 2017\n\nPCRE\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Multiple issues in pcre\nDescription: Multiple issues were addressed by updating to version\n8.40. \nCVE-2017-13846\nEntry added October 31, 2017\n\nPostfix\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Multiple issues in Postfix\nDescription: Multiple issues were addressed by updating to version\n3.2.2. \nCVE-2017-13826: an anonymous researcher\nEntry added October 31, 2017\n\nQuick Look\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13822: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nQuick Look\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Parsing a maliciously crafted office document may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-7132: Australian Cyber Security Centre a Australian Signals\nDirectorate\nEntry added October 31, 2017\n\nQuickTime\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-13823: an anonymous researcher\nEntry added October 31, 2017\n\nRemote Management\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13808: an anonymous researcher\nEntry added October 31, 2017\n\nSandbox\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-13838: an anonymous researcher\nEntry added October 31, 2017\n\nScreen Lock\nAvailable for: OS X Lion v10.8 and later\nImpact: Application Firewall prompts may appear over Login Window\nDescription: A window management issue was addressed through improved\nstate management. \nCVE-2017-7082: Tim Kingman\n\nSecurity\nAvailable for: OS X Lion v10.8 and later\nImpact: A revoked certificate may be trusted\nDescription: A certificate validation issue existed in the handling\nof revocation data. This issue was addressed through improved\nvalidation. \nCVE-2017-7080: Sven Driemecker of adesso mobile solutions gmbh, Rune\nDarrud (@theflyingcorpse) of BA|rum kommune, an anonymous researcher,\nan anonymous researcher\n\nSpotlight\nAvailable for: OS X Mountain Lion 10.8 and later\nImpact: Spotlight may display results for files not belonging to the\nuser\nDescription: An access issue existed in Spotlight. This issue was\naddressed through improved access restrictions. \nCVE-2017-13839: an anonymous researcher\nEntry added October 31, 2017\n\nSQLite\nAvailable for: OS X Lion v10.8 and later\nImpact: Multiple issues in SQLite\nDescription: Multiple issues were addressed by updating to version\n3.19.3. \nCVE-2017-10989: found by OSS-Fuzz\nCVE-2017-7128: found by OSS-Fuzz\nCVE-2017-7129: found by OSS-Fuzz\nCVE-2017-7130: found by OSS-Fuzz\n\nSQLite\nAvailable for: OS X Lion v10.8 and later\nImpact: An application may be able to execute arbitrary code with\nsystem privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-7127: an anonymous researcher\n\nWebKit\nAvailable for: OS X Lion v10.8 and later\nImpact: A malicious website may be able to track users in Safari\nprivate browsing mode\nDescription: A permissions issue existed in the handling of web\nbrowser cookies. This issue was addressed with improved restrictions. \nCVE-2017-7144: an anonymous researcher\n\nzlib\nAvailable for: OS X Lion v10.8 and later\nImpact: Multiple issues in zlib\nDescription: Multiple issues were addressed by updating to version\n1.2.11. \nCVE-2016-9840\nCVE-2016-9841\nCVE-2016-9842\nCVE-2016-9843\n\nInstallation note:\n\nmacOS High Sierra 10.13 may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nN+hmcqhXbgblWwiT0ma/I7Yn0b7O9g9stN88cL9cr3I=\n=887+\n-----END PGP SIGNATURE-----\n\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2017-13807" }, { "db": "JVNDB", "id": "JVNDB-2017-010378" }, { "db": "VULHUB", "id": "VHN-104466" }, { "db": "PACKETSTORM", "id": "144862" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-13807", "trust": 2.6 }, { "db": "SECTRACK", "id": "1039710", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU99000953", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-010378", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201709-167", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-104466", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "144862", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-104466" }, { "db": "JVNDB", "id": "JVNDB-2017-010378" }, { "db": "PACKETSTORM", "id": "144862" }, { "db": "CNNVD", "id": "CNNVD-201709-167" }, { "db": "NVD", "id": "CVE-2017-13807" } ] }, "id": "VAR-201711-0458", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-104466" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T19:55:21.351000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Apple security updates", "trust": 0.8, "url": "https://support.apple.com/en-us/HT201222" }, { "title": "HT208221", "trust": 0.8, "url": "https://support.apple.com/en-us/HT208221" }, { "title": "HT208221", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT208221" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010378" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-104466" }, { "db": "JVNDB", "id": "JVNDB-2017-010378" }, { "db": "NVD", "id": "CVE-2017-13807" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.apple.com/ht208221" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1039710" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13807" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13807" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu99000953/index.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13782" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13810" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-5387" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13809" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10989" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13817" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0381" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9842" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8743" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-1000373" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13808" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13814" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9042" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13811" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-4736" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2161" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13816" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8740" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9840" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13813" }, { "trust": 0.1, "url": "https://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9063" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9841" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-9843" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13812" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13815" } ], "sources": [ { "db": "VULHUB", "id": "VHN-104466" }, { "db": "JVNDB", "id": "JVNDB-2017-010378" }, { "db": "PACKETSTORM", "id": "144862" }, { "db": "CNNVD", "id": "CNNVD-201709-167" }, { "db": "NVD", "id": "CVE-2017-13807" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-104466" }, { "db": "JVNDB", "id": "JVNDB-2017-010378" }, { "db": "PACKETSTORM", "id": "144862" }, { "db": "CNNVD", "id": "CNNVD-201709-167" }, { "db": "NVD", "id": "CVE-2017-13807" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-13T00:00:00", "db": "VULHUB", "id": "VHN-104466" }, { "date": "2017-12-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010378" }, { "date": "2017-11-02T23:36:12", "db": "PACKETSTORM", "id": "144862" }, { "date": "2017-08-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-167" }, { "date": "2017-11-13T03:29:01.113000", "db": "NVD", "id": "CVE-2017-13807" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-11-27T00:00:00", "db": "VULHUB", "id": "VHN-104466" }, { "date": "2017-12-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010378" }, { "date": "2017-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201709-167" }, { "date": "2024-11-21T03:11:42.583000", "db": "NVD", "id": "CVE-2017-13807" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-167" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple macOS of Audio Vulnerability in arbitrary code execution in components", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010378" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201709-167" } ], "trust": 0.6 } }
gsd-2017-13807
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-13807", "description": "An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \"Audio\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file.", "id": "GSD-2017-13807" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-13807" ], "details": "An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \"Audio\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file.", "id": "GSD-2017-13807", "modified": "2023-12-13T01:21:01.940857Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2017-13807", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \"Audio\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "url": "https://support.apple.com/HT208221" }, { "name": "1039710", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039710" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.13.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2017-13807" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \"Audio\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-20" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT208221", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT208221" }, { "name": "1039710", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039710" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2017-11-27T16:34Z", "publishedDate": "2017-11-13T03:29Z" } } }
fkie_cve-2017-13807
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
product-security@apple.com | http://www.securitytracker.com/id/1039710 | Third Party Advisory, VDB Entry | |
product-security@apple.com | https://support.apple.com/HT208221 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039710 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT208221 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "7423593E-2B13-4369-A525-377AF02C01C9", "versionEndIncluding": "10.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the \"Audio\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory consumption) via a crafted QuickTime file." }, { "lang": "es", "value": "Se ha descubierto un problema en algunos productos Apple. Se han visto afectadas las versiones de macOS anteriores a la 10.13.1. El problema afecta al componente \"Audio\". Permite que atacantes remotos ejecuten c\u00f3digo arbitrario o provoquen una denegaci\u00f3n de servicio (consumo de memoria) mediante un archivo QuickTime manipulado." } ], "id": "CVE-2017-13807", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-13T03:29:01.113", "references": [ { "source": "product-security@apple.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039710" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT208221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039710" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT208221" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2017-33922
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://support.apple.com/zh-cn/HT208221
Name | Apple macOS High Sierra <10.13.1 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2017-13807" } }, "description": "Apple macOS High Sierra\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\u3002Audio\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u97f3\u9891\u7ec4\u4ef6\u3002\r\n\r\nApple macOS High Sierra 10.13.1\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684Audio\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684QuickTime\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5\u7cfb\u7edf\u6743\u9650\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5185\u5b58\u6d88\u8017\uff09\u3002", "discovererName": "Unknow", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://support.apple.com/zh-cn/HT208221", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-33922", "openTime": "2017-11-15", "patchDescription": "Apple macOS High Sierra\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\u3002Audio\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u97f3\u9891\u7ec4\u4ef6\u3002\r\n\r\nApple macOS High Sierra 10.13.1\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684Audio\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684QuickTime\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5\u7cfb\u7edf\u6743\u9650\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5185\u5b58\u6d88\u8017\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Apple macOS High Sierra Audio\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Apple macOS High Sierra \u003c10.13.1" }, "referenceLink": "https://support.apple.com/en-us/HT208221", "serverity": "\u9ad8", "submitTime": "2017-11-01", "title": "Apple macOS High Sierra Audio\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.