Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-2512 (GCVE-0-2017-2512)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:55:06.050Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1038484", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038484" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/HT207797" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-05-15T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \"Sandbox\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-07T09:57:01", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "1038484", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038484" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/HT207797" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2017-2512", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \"Sandbox\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1038484", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038484" }, { "name": "https://support.apple.com/HT207797", "refsource": "CONFIRM", "url": "https://support.apple.com/HT207797" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2017-2512", "datePublished": "2017-05-22T04:54:00", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-08-05T13:55:06.050Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-2512\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2017-05-22T05:29:00.990\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \\\"Sandbox\\\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 un problema en ciertos productos de Apple. MacOS anterior a versi\u00f3n 10.12.5 est\u00e1 afectado. El problema involucra al componente \\\"Sandbox\\\". Permite a los atacantes conducir ataques de escape del sandbox o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una aplicaci\u00f3n dise\u00f1ada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"10.12.4\",\"matchCriteriaId\":\"7D3C1AE1-D2BB-4964-8B15-E6573216DB2A\"}]}]}],\"references\":[{\"url\":\"http://www.securitytracker.com/id/1038484\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/HT207797\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1038484\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/HT207797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
cnvd-2017-08149
Vulnerability from cnvd
用户可参考如下厂商提供的安全补丁以修复该漏洞: https://support.apple.com/en-us/HT207797
Name | Apple macOS <10.12.5 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2017-2512" } }, "description": "Apple macOS\u662f\u4e00\u5957\u8fd0\u884c\u4e8e\u82f9\u679cMacintosh\u7cfb\u5217\u7535\u8111\u4e0a\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nApple macOS Sierra\u5b58\u5728\u6c99\u76d2\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8be5\u6f0f\u6d1e\u6784\u5efa\u6076\u610f\u5e94\u7528\uff0c\u63d0\u5347\u6743\u9650\u3002", "discovererName": "Federico Bento", "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://support.apple.com/en-us/HT207797", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2017-08149", "openTime": "2017-06-04", "patchDescription": "Apple macOS\u662f\u4e00\u5957\u8fd0\u884c\u4e8e\u82f9\u679cMacintosh\u7cfb\u5217\u7535\u8111\u4e0a\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nApple macOS Sierra\u5b58\u5728\u6c99\u76d2\u7ed5\u8fc7\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u8be5\u6f0f\u6d1e\u6784\u5efa\u6076\u610f\u5e94\u7528\uff0c\u63d0\u5347\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Apple macOS Sierra\u6c99\u76d2\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Apple macOS \u003c10.12.5" }, "referenceLink": "https://support.apple.com/en-us/HT207797\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-2512", "serverity": "\u4e2d", "submitTime": "2017-05-23", "title": "Apple macOS Sierra\u6c99\u76d2\u7ed5\u8fc7\u6f0f\u6d1e" }
var-201705-3227
Vulnerability from variot
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "Sandbox" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app. Apple macOS is prone to multiple security vulnerabilities. An attacker can exploit these issues to gain elevated privileges, perform unauthorized actions and execute arbitrary code with kernel privileges. Failed exploit attempts will likely cause a denial-of-service condition. Apple macOS Sierra is a dedicated operating system developed by Apple for Mac computers. Sandbox is a sandbox system that provides the operating system with a method to limit the use of system resources by applications. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2017-05-15-1 macOS 10.12.5
macOS 10.12.5 is now available and addresses the following:
802.1X Available for: macOS Sierra 10.12.4 Impact: A malicious network with 802.1X authentication may be able to capture user network credentials Description: A certificate validation issue existed in EAP-TLS when a certificate changed. This issue was addressed through improved certificate validation. CVE-2017-6988: Tim Cappalli of Aruba, a Hewlett Packard Enterprise company
Accessibility Framework Available for: macOS Sierra 10.12.4 Impact: An application may be able to gain system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-6978: Ian Beer of Google Project Zero
CoreAnimation Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: Processing maliciously crafted data may lead to arbitrary code execution Description: A memory consumption issue was addressed through improved memory handling. CVE-2017-2527: Ian Beer of Google Project Zero
CoreAudio Available for: macOS Sierra 10.12.4 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-2502: Yangkang (@dnpushme) of Qihoo360 Qex Team
DiskArbitration Available for: macOS Sierra 10.12.4 and OS X El Capitan v10.11.6 Impact: An application may be able to gain system privileges Description: A race condition was addressed with additional filesystem restrictions. CVE-2017-2533: Samuel GroA and Niklas Baumstark working with Trend Micro's Zero Day Initiative
HFS Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-6990: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative
iBooks Available for: macOS Sierra 10.12.4 Impact: A maliciously crafted book may open arbitrary websites without user permission Description: A URL handling issue was addressed through improved state management. CVE-2017-2497: Jun Kokatsu (@shhnjk)
iBooks Available for: macOS Sierra 10.12.4 Impact: An application may be able to execute arbitrary code with root privileges Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization. CVE-2017-6981: evi1m0 of YSRC (sec.ly.com)
iBooks Available for: macOS Sierra 10.12.4 Impact: An application may be able to escape its sandbox Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-6986: evi1m0 of YSRC (sec.ly.com) & Heige (SuperHei) of Knownsec 404 Security Team
Intel Graphics Driver Available for: macOS Sierra 10.12.4 Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2503: sss and Axis of 360Nirvan team
IOGraphics Available for: macOS Sierra 10.12.4 Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2545: 360 Security (@mj0011sec) working with Trend Micro's Zero Day Initiative
IOSurface Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-6979: Adam Donenfeld of Zimperium zLabs
Kernel Available for: macOS Sierra 10.12.4 Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2494: Jann Horn of Google Project Zero
Kernel Available for: macOS Sierra 10.12.4 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed through improved locking. CVE-2017-2501: Ian Beer of Google Project Zero
Kernel Available for: macOS Sierra 10.12.4 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-2507: Ian Beer of Google Project Zero CVE-2017-2509: Jann Horn of Google Project Zero CVE-2017-6987: Patrick Wardle of Synack
Kernel Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-2516: Jann Horn of Google Project Zero
Kernel Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2546: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative
Multi-Touch Available for: macOS Sierra 10.12.4 Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2542: 360 Security (@mj0011sec) working with Trend Micro's Zero Day Initiative CVE-2017-2543: 360 Security (@mj0011sec) working with Trend Micro's Zero Day Initiative
NVIDIA Graphics Drivers Available for: macOS Sierra 10.12.4 Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-6985: Axis and sss of Nirvan Team of Qihoo 360 and Simon Huang (@HuangShaomang) of IceSword Lab of Qihoo 360
Sandbox Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: An application may be able to escape its sandbox Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2512: Federico Bento of Faculty of Sciences, University of Porto
Security Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: An application may be able to escape its sandbox Description: A resource exhaustion issue was addressed through improved input validation. CVE-2017-2535: Samuel GroA and Niklas Baumstark working with Trend Micro's Zero Day Initiative
Speech Framework Available for: macOS Sierra 10.12.4 Impact: An application may be able to escape its sandbox Description: An access issue was addressed through additional sandbox restrictions. CVE-2017-2534: Samuel GroA and Niklas Baumstark working with Trend Micro's Zero Day Initiative
Speech Framework Available for: macOS Sierra 10.12.4 Impact: An application may be able to escape its sandbox Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-6977: Samuel GroA and Niklas Baumstark working with Trend Micro's Zero Day Initiative
SQLite Available for: macOS Sierra 10.12.4 Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A use after free issue was addressed through improved memory management. CVE-2017-2513: found by OSS-Fuzz
SQLite Available for: macOS Sierra 10.12.4 Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-2518: found by OSS-Fuzz CVE-2017-2520: found by OSS-Fuzz
SQLite Available for: macOS Sierra 10.12.4 Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2519: found by OSS-Fuzz
SQLite Available for: macOS Sierra 10.12.4 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2017-6983: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative CVE-2017-6991: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative
TextInput Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: Parsing maliciously crafted data may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2524: Ian Beer of Google Project Zero
WindowServer Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: An application may be able to gain system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2537: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative CVE-2017-2541: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative CVE-2017-2548: Team Sniper (Keen Lab and PC Mgr) working with Trend Micro's Zero Day Initiative
WindowServer Available for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6, and OS X Yosemite v10.10.5 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-2540: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative
Installation note:
macOS 10.12.5 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://www.apple.com/support/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJZGdmLAAoJEIOj74w0bLRGU2cP/2EqdcJ943FWZZLD0q12RgWs K2leunn93aYhkoT8IL2AvZ22mDSs5EIbTPEFfyHlu9GDbSTfUSq3AWsuGVrN8qSW IRkv3herbpZEIU8pNKHVsJBWgQf+pVnAHvJ/uvRQ9ZcseSOPhnmPKSAlpjSi4R4A SzSEzYoW0QaJzSOGvMmbToIgB+s1IcUVBAwrM/MIIO8kmtKo7uCsxX1y9W1PC3kO 4RyW87YomoVHCBN8PC755pMwhgF3mCx/yXoYdHn1b0BN82CqIvKj8SkHu3AJB+Rf ZcEEVbVlEVJHwvYdvd18ugiOdLXbe8hAHmU7YrLj7srhLpob9MC/KdfKxpTjGolS F7ocgZ5UrP8bQeWW9o1I1bpe6HdANl6UWTBjYKTVs4MM9g2UQiiOz4FCH2Ogk4EA rX8aQ62gzTIZp5tjqVvypT1SEf5/VJkM+P+p+ckxtgRWYxv7NLY8kFuVO7IlAC+I VZRpWLUryLSMdype0z0KAhnu+PZS9Rx6vnCrlRU6QZu3OHWjcOu0eF7wmt5lTWhX t4goc89xPIqLgD042B21PTdHlW5umrvDuqNzOzgqUmPHKllSCdZamrN2R4R1rrUu FKS+y2EC2KW41uozZFblHYRHEwAAeXqNhJYqAQAF/E7Tu0wWZzCtNn1XsEOu54pq EYP8FFm3hsrGF6D9D4Sl =MYfD -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3227", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mac os x", "scope": "eq", "trust": 1.4, "vendor": "apple", "version": "10.12.4" }, { "model": "mac os x", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.12.4" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.10.5" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "10.11.6" }, { "model": "macos", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.12.4" }, { "model": "macos", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.12.3" }, { "model": "macos", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.12.2" }, { "model": "macos", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.12.1" }, { "model": "macos", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.12" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.10.5" }, { "model": "macos", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "10.12.5" } ], "sources": [ { "db": "BID", "id": "98483" }, { "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "db": "CNNVD", "id": "CNNVD-201705-1010" }, { "db": "NVD", "id": "CVE-2017-2512" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003837" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tim Cappalli of Aruba, Ian Beer of Google Project Zero, Samuel Gro? and Niklas Baumstark, Chaitin Security Research Lab, evi1m0 of YSRC, sss and Axis of 360Nirvan team, 360 Security, Jann Horn, Federico Bento of Faculty of Sciences, Richard Zhu, and Team", "sources": [ { "db": "BID", "id": "98483" } ], "trust": 0.3 }, "cve": "CVE-2017-2512", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-2512", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-110715", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-2512", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-2512", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-2512", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201705-1010", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-110715", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-110715" }, { "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "db": "CNNVD", "id": "CNNVD-201705-1010" }, { "db": "NVD", "id": "CVE-2017-2512" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \"Sandbox\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app. Apple macOS is prone to multiple security vulnerabilities. \nAn attacker can exploit these issues to gain elevated privileges, perform unauthorized actions and execute arbitrary code with kernel privileges. Failed exploit attempts will likely cause a denial-of-service condition. Apple macOS Sierra is a dedicated operating system developed by Apple for Mac computers. Sandbox is a sandbox system that provides the operating system with a method to limit the use of system resources by applications. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-05-15-1 macOS 10.12.5\n\nmacOS 10.12.5 is now available and addresses the following:\n\n802.1X\nAvailable for: macOS Sierra 10.12.4\nImpact: A malicious network with 802.1X authentication may be able to\ncapture user network credentials\nDescription: A certificate validation issue existed in EAP-TLS when a\ncertificate changed. This issue was addressed through improved\ncertificate validation. \nCVE-2017-6988: Tim Cappalli of Aruba, a Hewlett Packard Enterprise\ncompany\n\nAccessibility Framework\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to gain system privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-6978: Ian Beer of Google Project Zero\n\nCoreAnimation\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: Processing maliciously crafted data may lead to arbitrary\ncode execution\nDescription: A memory consumption issue was addressed through\nimproved memory handling. \nCVE-2017-2527: Ian Beer of Google Project Zero\n\nCoreAudio\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-2502: Yangkang (@dnpushme) of Qihoo360 Qex Team\n\nDiskArbitration\nAvailable for: macOS Sierra 10.12.4 and OS X El Capitan v10.11.6\nImpact: An application may be able to gain system privileges\nDescription: A race condition was addressed with additional\nfilesystem restrictions. \nCVE-2017-2533: Samuel GroA and Niklas Baumstark working with Trend\nMicro\u0027s Zero Day Initiative\n\nHFS\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-6990: Chaitin Security Research Lab (@ChaitinTech) working\nwith Trend Micro\u0027s Zero Day Initiative\n\niBooks\nAvailable for: macOS Sierra 10.12.4\nImpact: A maliciously crafted book may open arbitrary websites\nwithout user permission\nDescription: A URL handling issue was addressed through improved\nstate management. \nCVE-2017-2497: Jun Kokatsu (@shhnjk)\n\niBooks\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to execute arbitrary code with\nroot privileges\nDescription: An issue existed within the path validation logic for\nsymlinks. This issue was addressed through improved path\nsanitization. \nCVE-2017-6981: evi1m0 of YSRC (sec.ly.com)\n\niBooks\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to escape its sandbox\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-6986: evi1m0 of YSRC (sec.ly.com) \u0026 Heige (SuperHei) of\nKnownsec 404 Security Team\n\nIntel Graphics Driver\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to gain kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2503: sss and Axis of 360Nirvan team\n\nIOGraphics\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to gain kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2545: 360 Security (@mj0011sec) working with Trend Micro\u0027s\nZero Day Initiative\n\nIOSurface\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: An application may be able to gain kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-6979: Adam Donenfeld of Zimperium zLabs\n\nKernel\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to gain kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2494: Jann Horn of Google Project Zero\n\nKernel\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A race condition was addressed through improved locking. \nCVE-2017-2501: Ian Beer of Google Project Zero\n\nKernel\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-2507: Ian Beer of Google Project Zero\nCVE-2017-2509: Jann Horn of Google Project Zero\nCVE-2017-6987: Patrick Wardle of Synack\n\nKernel\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-2516: Jann Horn of Google Project Zero\n\nKernel\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: An application may be able to gain kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2546: Chaitin Security Research Lab (@ChaitinTech) working\nwith Trend Micro\u0027s Zero Day Initiative\n\nMulti-Touch\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to gain kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2542: 360 Security (@mj0011sec) working with Trend Micro\u0027s\nZero Day Initiative\nCVE-2017-2543: 360 Security (@mj0011sec) working with Trend Micro\u0027s\nZero Day Initiative\n\nNVIDIA Graphics Drivers\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to gain kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-6985: Axis and sss of Nirvan Team of Qihoo 360 and Simon\nHuang (@HuangShaomang) of IceSword Lab of Qihoo 360\n\nSandbox\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: An application may be able to escape its sandbox\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2512: Federico Bento of Faculty of Sciences, University of\nPorto\n\nSecurity\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: An application may be able to escape its sandbox\nDescription: A resource exhaustion issue was addressed through\nimproved input validation. \nCVE-2017-2535: Samuel GroA and Niklas Baumstark working with Trend\nMicro\u0027s Zero Day Initiative\n\nSpeech Framework\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to escape its sandbox\nDescription: An access issue was addressed through additional sandbox\nrestrictions. \nCVE-2017-2534: Samuel GroA and Niklas Baumstark working with Trend\nMicro\u0027s Zero Day Initiative\n\nSpeech Framework\nAvailable for: macOS Sierra 10.12.4\nImpact: An application may be able to escape its sandbox\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-6977: Samuel GroA and Niklas Baumstark working with Trend\nMicro\u0027s Zero Day Initiative\n\nSQLite\nAvailable for: macOS Sierra 10.12.4\nImpact: A maliciously crafted SQL query may lead to arbitrary code\nexecution\nDescription: A use after free issue was addressed through improved\nmemory management. \nCVE-2017-2513: found by OSS-Fuzz\n\nSQLite\nAvailable for: macOS Sierra 10.12.4\nImpact: A maliciously crafted SQL query may lead to arbitrary code\nexecution\nDescription: A buffer overflow issue was addressed through improved\nmemory handling. \nCVE-2017-2518: found by OSS-Fuzz\nCVE-2017-2520: found by OSS-Fuzz\n\nSQLite\nAvailable for: macOS Sierra 10.12.4\nImpact: A maliciously crafted SQL query may lead to arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2519: found by OSS-Fuzz\n\nSQLite\nAvailable for: macOS Sierra 10.12.4\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved input validation. \nCVE-2017-6983: Chaitin Security Research Lab (@ChaitinTech) working\nwith Trend Micro\u0027s Zero Day Initiative\nCVE-2017-6991: Chaitin Security Research Lab (@ChaitinTech) working\nwith Trend Micro\u0027s Zero Day Initiative\n\nTextInput\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: Parsing maliciously crafted data may lead to arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2524: Ian Beer of Google Project Zero\n\nWindowServer\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: An application may be able to gain system privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2537: Chaitin Security Research Lab (@ChaitinTech) working\nwith Trend Micro\u0027s Zero Day Initiative\nCVE-2017-2541: Richard Zhu (fluorescence) working with Trend Micro\u0027s\nZero Day Initiative\nCVE-2017-2548: Team Sniper (Keen Lab and PC Mgr) working with Trend\nMicro\u0027s Zero Day Initiative\n\nWindowServer\nAvailable for: macOS Sierra 10.12.4, OS X El Capitan v10.11.6,\nand OS X Yosemite v10.10.5\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-2540: Richard Zhu (fluorescence) working with Trend Micro\u0027s\nZero Day Initiative\n\nInstallation note:\n\nmacOS 10.12.5 may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://www.apple.com/support/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\nEYP8FFm3hsrGF6D9D4Sl\n=MYfD\n-----END PGP SIGNATURE-----\n\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2017-2512" }, { "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "db": "BID", "id": "98483" }, { "db": "VULHUB", "id": "VHN-110715" }, { "db": "PACKETSTORM", "id": "142506" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2512", "trust": 2.9 }, { "db": "SECTRACK", "id": "1038484", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU98089541", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-003837", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201705-1010", "trust": 0.7 }, { "db": "BID", "id": "98483", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-110715", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "142506", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110715" }, { "db": "BID", "id": "98483" }, { "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "db": "PACKETSTORM", "id": "142506" }, { "db": "CNNVD", "id": "CNNVD-201705-1010" }, { "db": "NVD", "id": "CVE-2017-2512" } ] }, "id": "VAR-201705-3227", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-110715" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:04:05.391000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Apple security updates", "trust": 0.8, "url": "https://support.apple.com/en-us/HT201222" }, { "title": "HT207797", "trust": 0.8, "url": "https://support.apple.com/en-us/HT207797" }, { "title": "HT207797", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT207797" }, { "title": "Apple macOS Sierra Sandbox Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=70486" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "db": "CNNVD", "id": "CNNVD-201705-1010" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110715" }, { "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "db": "NVD", "id": "CVE-2017-2512" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://support.apple.com/ht207797" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1038484" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2512" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2512" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu98089541/index.html" }, { "trust": 0.3, "url": "https://www.apple.com/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2509" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2542" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2548" }, { "trust": 0.1, "url": "https://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6978" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2502" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2516" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2545" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2520" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2519" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2543" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2535" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2507" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2533" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2494" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2546" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2518" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2537" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2513" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2540" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6977" }, { "trust": 0.1, "url": "https://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2527" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2534" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2524" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2501" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2541" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2503" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2497" } ], "sources": [ { "db": "VULHUB", "id": "VHN-110715" }, { "db": "BID", "id": "98483" }, { "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "db": "PACKETSTORM", "id": "142506" }, { "db": "CNNVD", "id": "CNNVD-201705-1010" }, { "db": "NVD", "id": "CVE-2017-2512" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-110715" }, { "db": "BID", "id": "98483" }, { "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "db": "PACKETSTORM", "id": "142506" }, { "db": "CNNVD", "id": "CNNVD-201705-1010" }, { "db": "NVD", "id": "CVE-2017-2512" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-22T00:00:00", "db": "VULHUB", "id": "VHN-110715" }, { "date": "2017-05-15T00:00:00", "db": "BID", "id": "98483" }, { "date": "2017-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "date": "2017-05-15T13:02:22", "db": "PACKETSTORM", "id": "142506" }, { "date": "2017-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201705-1010" }, { "date": "2017-05-22T05:29:00.990000", "db": "NVD", "id": "CVE-2017-2512" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-08T00:00:00", "db": "VULHUB", "id": "VHN-110715" }, { "date": "2017-05-15T00:00:00", "db": "BID", "id": "98483" }, { "date": "2017-06-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003837" }, { "date": "2017-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201705-1010" }, { "date": "2024-11-21T03:23:40.547000", "db": "NVD", "id": "CVE-2017-2512" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201705-1010" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple OS X of Sandbox Component vulnerable to sandbox escape attacks", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003837" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201705-1010" } ], "trust": 0.6 } }
fkie_cve-2017-2512
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
product-security@apple.com | http://www.securitytracker.com/id/1038484 | ||
product-security@apple.com | https://support.apple.com/HT207797 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1038484 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT207797 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D3C1AE1-D2BB-4964-8B15-E6573216DB2A", "versionEndIncluding": "10.12.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \"Sandbox\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en ciertos productos de Apple. MacOS anterior a versi\u00f3n 10.12.5 est\u00e1 afectado. El problema involucra al componente \"Sandbox\". Permite a los atacantes conducir ataques de escape del sandbox o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de una aplicaci\u00f3n dise\u00f1ada." } ], "id": "CVE-2017-2512", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-22T05:29:00.990", "references": [ { "source": "product-security@apple.com", "url": "http://www.securitytracker.com/id/1038484" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT207797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1038484" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT207797" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-4cf8-fh5r-p8gm
Vulnerability from github
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "Sandbox" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app.
{ "affected": [], "aliases": [ "CVE-2017-2512" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-05-22T05:29:00Z", "severity": "HIGH" }, "details": "An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \"Sandbox\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app.", "id": "GHSA-4cf8-fh5r-p8gm", "modified": "2022-05-17T02:34:53Z", "published": "2022-05-17T02:34:53Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2512" }, { "type": "WEB", "url": "https://support.apple.com/HT207797" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1038484" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2017-2512
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-2512", "description": "An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \"Sandbox\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app.", "id": "GSD-2017-2512" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-2512" ], "details": "An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \"Sandbox\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app.", "id": "GSD-2017-2512", "modified": "2023-12-13T01:21:05.856037Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2017-2512", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \"Sandbox\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1038484", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038484" }, { "name": "https://support.apple.com/HT207797", "refsource": "CONFIRM", "url": "https://support.apple.com/HT207797" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "10.12.4", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2017-2512" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the \"Sandbox\" component. It allows attackers to conduct sandbox-escape attacks or cause a denial of service (memory corruption) via a crafted app." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/HT207797", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/HT207797" }, { "name": "1038484", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id/1038484" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2017-07-08T01:29Z", "publishedDate": "2017-05-22T05:29Z" } } }
CERTFR-2017-AVI-155
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Apple | N/A | iCloud pour Windows versions antérieures à 6.2.1 | ||
Apple | N/A | tvOS versions antérieures à 10.2.1 | ||
Apple | N/A | watchOS versions antérieures à 3.2.2 | ||
Apple | N/A | El Capitan sans le correctif de sécurité 2017-002 | ||
Apple | N/A | iOS versions antérieures à 10.3.2 | ||
Apple | N/A | Yosemite sans le correctif de sécurité 2017-002 | ||
Apple | Safari | Safari versions antérieures à 10.1.1 | ||
Apple | N/A | iTunes versions antérieures à 12.6.1 sur Windows | ||
Apple | macOS | macOS Sierra versions antérieures à 10.12.5 |
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2.1", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "tvOS versions ant\u00e9rieures \u00e0 10.2.1", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "watchOS versions ant\u00e9rieures \u00e0 3.2.2", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "El Capitan sans le correctif de s\u00e9curit\u00e9 2017-002", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iOS versions ant\u00e9rieures \u00e0 10.3.2", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Yosemite sans le correctif de s\u00e9curit\u00e9 2017-002", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Safari versions ant\u00e9rieures \u00e0 10.1.1", "product": { "name": "Safari", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iTunes versions ant\u00e9rieures \u00e0 12.6.1 sur Windows", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.5", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2017-2541", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2541" }, { "name": "CVE-2017-2494", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2494" }, { "name": "CVE-2017-2545", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2545" }, { "name": "CVE-2017-2540", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2540" }, { "name": "CVE-2017-6989", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6989" }, { "name": "CVE-2017-6983", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6983" }, { "name": "CVE-2017-2520", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2520" }, { "name": "CVE-2017-2518", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2518" }, { "name": "CVE-2017-2514", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2514" }, { "name": "CVE-2017-2528", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2528" }, { "name": "CVE-2017-2508", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2508" }, { "name": "CVE-2017-2524", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2524" }, { "name": "CVE-2017-2496", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2496" }, { "name": "CVE-2017-2535", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2535" }, { "name": "CVE-2017-6979", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6979" }, { "name": "CVE-2017-2548", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2548" }, { "name": "CVE-2017-2527", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2527" }, { "name": "CVE-2017-2544", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2544" }, { "name": "CVE-2017-2511", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2511" }, { "name": "CVE-2017-2519", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2519" }, { "name": "CVE-2017-6988", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6988" }, { "name": "CVE-2017-2516", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2516" }, { "name": "CVE-2017-2507", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2507" }, { "name": "CVE-2017-2499", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2499" }, { "name": "CVE-2017-2510", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2510" }, { "name": "CVE-2017-6990", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6990" }, { "name": "CVE-2017-2531", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2531" }, { "name": "CVE-2017-2534", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2534" }, { "name": "CVE-2017-2525", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2525" }, { "name": "CVE-2017-6986", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6986" }, { "name": "CVE-2017-2547", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2547" }, { "name": "CVE-2017-2538", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2538" }, { "name": "CVE-2017-6978", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6978" }, { "name": "CVE-2017-2530", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2530" }, { "name": "CVE-2017-6991", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6991" }, { "name": "CVE-2017-6985", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6985" }, { "name": "CVE-2017-2526", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2526" }, { "name": "CVE-2017-6984", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6984" }, { "name": "CVE-2017-2533", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2533" }, { "name": "CVE-2017-2543", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2543" }, { "name": "CVE-2017-2504", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2504" }, { "name": "CVE-2017-6980", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6980" }, { "name": "CVE-2017-2515", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2515" }, { "name": "CVE-2017-2542", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2542" }, { "name": "CVE-2017-2495", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2495" }, { "name": "CVE-2017-2549", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2549" }, { "name": "CVE-2017-2503", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2503" }, { "name": "CVE-2017-2502", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2502" }, { "name": "CVE-2017-6982", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6982" }, { "name": "CVE-2017-2506", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2506" }, { "name": "CVE-2017-2536", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2536" }, { "name": "CVE-2017-6977", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6977" }, { "name": "CVE-2017-2500", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2500" }, { "name": "CVE-2017-6981", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6981" }, { "name": "CVE-2017-6987", "url": "https://www.cve.org/CVERecord?id=CVE-2017-6987" }, { "name": "CVE-2017-2546", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2546" }, { "name": "CVE-2017-2512", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2512" }, { "name": "CVE-2017-2501", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2501" }, { "name": "CVE-2017-2513", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2513" }, { "name": "CVE-2017-2539", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2539" }, { "name": "CVE-2017-2509", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2509" }, { "name": "CVE-2017-2521", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2521" }, { "name": "CVE-2017-2505", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2505" }, { "name": "CVE-2017-2498", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2498" }, { "name": "CVE-2017-2497", "url": "https://www.cve.org/CVERecord?id=CVE-2017-2497" } ], "initial_release_date": "2017-05-16T00:00:00", "last_revision_date": "2017-05-16T00:00:00", "links": [], "reference": "CERTFR-2017-AVI-155", "revisions": [ { "description": "version initiale.", "revision_date": "2017-05-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207801 du 15 mai 2017", "url": "https://support.apple.com/en-us/HT207801" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207800 du 15 mai 2017", "url": "https://support.apple.com/en-us/HT207800" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207805 du 15 mai 2017", "url": "https://support.apple.com/en-us/HT207805" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207798 du 15 mai 2017", "url": "https://support.apple.com/en-us/HT207798" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207804 du 15 mai 2017", "url": "https://support.apple.com/en-us/HT207804" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207797 du 15 mai 2017", "url": "https://support.apple.com/en-us/HT207797" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT207803 du 15 mai 2017", "url": "https://support.apple.com/en-us/HT207803" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.