var-201702-0887
Vulnerability from variot
An issue was discovered in certain Apple products. GarageBand before 10.1.6 is affected. The issue involves the "Projects" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted GarageBand project file. Apple From GarageBand and Logic Pro X An update for has been released.Crafted GarageBand An arbitrary code may be executed by opening the project file. Apple GarageBand is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code on the affected system. Failed exploit attempts may result in a denial-of-service condition. Apple GarageBand is a set of music production software from Apple (Apple). A memory corruption vulnerability exists in versions of Apple GarageBand prior to 10.1.6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2017-02-21-1 GarageBand 10.1.6
GarageBand 10.1.6 is now available and addresses the following:
Projects Available for: OS X Yosemite v10.10 or later Impact: Opening a maliciously crafted GarageBand Project file may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-2017-2374: Tyler Bohan of Cisco Talos
Installation note:
GarageBand may be obtained from the Mac App Store.
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJYrImXAAoJEIOj74w0bLRGyr0QAILapV0W5UfNAcFn8FeZIXKw H10/c+doJ41Y3QQH+4qo+Y0eMVlKLc8zkQk0Ocz+e3RYtScFCELVysX037qczPuW Znr9lvycMgpuYfIosWmde+1FF7nvSiN7RvAVRMBN4OIOmFT82h+vFxZf2Zeka4JL Ali8kh6uK3W3A8kNJiO0sM/r0G8nRf6OvgtH5YL9gjBc9e6J1m4upx4KEMPRlaiY Ykn7Y03gYk11LwTlB1Q5f+b88VTMtItPLadal3ICQONXGGBu6GyvjOLQVAxVvggn K4pgPRSDh/YvRlCcXl319sJigg+0Fa6gFk/NHcMI4YzOhxWHNUWDzrG721aJCRer 6YWcD6LgHsJODi8yp4yuJ3DbESh3WFiWS4ATVJThOuW8hATGhukbPHvwcoPaM3rN 5MLhImi9QpT2rE92DpQ5X0m/KzLdhOrgk3CnyR1aKmP2L2qD4ZbKlwdMwIKByxlW ypcv+C9BP31KcPLbLhsQGOuNb4NGeTbKv/yQvHB3KeN/w750WtMamT2CE8sFkPnu +X5wQk6pZi6e4Xc5nQbLkIHEPtZNo4O8qUoPPmaTsK6lwcvB1C5/09Zcfc3pOBy7 +Cp+6dimx/nbCcK4dW8QzIZIEd88hXhk9I441lBUGE4AMXU6l5npV/DaZTZOj6Ga b9ZTShls177KyTLSw0CW =gmwM -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0887", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "garageband", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.1.5" }, { "model": "garageband", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "10.1.5" }, { "model": "garageband", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.1.6 earlier" }, { "model": "logic pro x", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.3.1 earlier" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.12.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.12.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.6" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.12.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.5" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.11" }, { "model": "logic pro", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.3" }, { "model": "logic pro", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.2" }, { "model": "logic pro", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.1" }, { "model": "garageband", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "garageband", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "garageband", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.1" }, { "model": "logic pro", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.3.1" }, { "model": "garageband", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "10.1.6" } ], "sources": [ { "db": "BID", "id": "96171" }, { "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "db": "CNNVD", "id": "CNNVD-201702-650" }, { "db": "NVD", "id": "CVE-2017-2374" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:apple:garageband", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:logic_pro_x", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001449" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Tyler Bohan of Cisco Talos", "sources": [ { "db": "BID", "id": "96171" }, { "db": "CNNVD", "id": "CNNVD-201702-650" } ], "trust": 0.9 }, "cve": "CVE-2017-2374", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-2374", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-110577", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-2374", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-2374", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-2374", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201702-650", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-110577", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-110577" }, { "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "db": "CNNVD", "id": "CNNVD-201702-650" }, { "db": "NVD", "id": "CVE-2017-2374" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in certain Apple products. GarageBand before 10.1.6 is affected. The issue involves the \"Projects\" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted GarageBand project file. Apple From GarageBand and Logic Pro X An update for has been released.Crafted GarageBand An arbitrary code may be executed by opening the project file. Apple GarageBand is prone to a memory-corruption vulnerability. \nAttackers can exploit this issue to execute arbitrary code on the affected system. Failed exploit attempts may result in a denial-of-service condition. Apple GarageBand is a set of music production software from Apple (Apple). A memory corruption vulnerability exists in versions of Apple GarageBand prior to 10.1.6. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-02-21-1 GarageBand 10.1.6\n\nGarageBand 10.1.6 is now available and addresses the following:\n\nProjects\nAvailable for: OS X Yosemite v10.10 or later\nImpact: Opening a maliciously crafted GarageBand Project file may\nlead to arbitrary code execution\nDescription: A memory corruption issue was addressed through improved\nmemory handling. \nCVE-2017-2374: Tyler Bohan of Cisco Talos\n\nInstallation note:\n\nGarageBand may be obtained from the Mac App Store. \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n\niQIcBAEBCgAGBQJYrImXAAoJEIOj74w0bLRGyr0QAILapV0W5UfNAcFn8FeZIXKw\nH10/c+doJ41Y3QQH+4qo+Y0eMVlKLc8zkQk0Ocz+e3RYtScFCELVysX037qczPuW\nZnr9lvycMgpuYfIosWmde+1FF7nvSiN7RvAVRMBN4OIOmFT82h+vFxZf2Zeka4JL\nAli8kh6uK3W3A8kNJiO0sM/r0G8nRf6OvgtH5YL9gjBc9e6J1m4upx4KEMPRlaiY\nYkn7Y03gYk11LwTlB1Q5f+b88VTMtItPLadal3ICQONXGGBu6GyvjOLQVAxVvggn\nK4pgPRSDh/YvRlCcXl319sJigg+0Fa6gFk/NHcMI4YzOhxWHNUWDzrG721aJCRer\n6YWcD6LgHsJODi8yp4yuJ3DbESh3WFiWS4ATVJThOuW8hATGhukbPHvwcoPaM3rN\n5MLhImi9QpT2rE92DpQ5X0m/KzLdhOrgk3CnyR1aKmP2L2qD4ZbKlwdMwIKByxlW\nypcv+C9BP31KcPLbLhsQGOuNb4NGeTbKv/yQvHB3KeN/w750WtMamT2CE8sFkPnu\n+X5wQk6pZi6e4Xc5nQbLkIHEPtZNo4O8qUoPPmaTsK6lwcvB1C5/09Zcfc3pOBy7\n+Cp+6dimx/nbCcK4dW8QzIZIEd88hXhk9I441lBUGE4AMXU6l5npV/DaZTZOj6Ga\nb9ZTShls177KyTLSw0CW\n=gmwM\n-----END PGP SIGNATURE-----\n\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2017-2374" }, { "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "db": "BID", "id": "96171" }, { "db": "VULHUB", "id": "VHN-110577" }, { "db": "PACKETSTORM", "id": "141290" }, { "db": "PACKETSTORM", "id": "141291" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-2374", "trust": 3.0 }, { "db": "BID", "id": "96171", "trust": 2.0 }, { "db": "TALOS", "id": "TALOS-2017-0275", "trust": 1.1 }, { "db": "SECTRACK", "id": "1037868", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU99002156", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-001449", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201702-650", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "141290", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "141291", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-96572", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-110577", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110577" }, { "db": "BID", "id": "96171" }, { "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "db": "PACKETSTORM", "id": "141290" }, { "db": "PACKETSTORM", "id": "141291" }, { "db": "CNNVD", "id": "CNNVD-201702-650" }, { "db": "NVD", "id": "CVE-2017-2374" } ] }, "id": "VAR-201702-0887", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-110577" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:13:10.243000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT207519", "trust": 0.8, "url": "https://support.apple.com/en-us/HT207519" }, { "title": "HT207518", "trust": 0.8, "url": "https://support.apple.com/en-us/HT207518" }, { "title": "HT207519", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT207519" }, { "title": "HT207518", "trust": 0.8, "url": "https://support.apple.com/ja-jp/HT207518" }, { "title": "Vulnerability Spotlight: Apple Garage Band Out of Bounds Write Vulnerability", "trust": 0.8, "url": "http://blog.talosintelligence.com/2017/02/apple-garageband.html" }, { "title": "Apple GarageBand Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68180" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "db": "CNNVD", "id": "CNNVD-201702-650" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-110577" }, { "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "db": "NVD", "id": "CVE-2017-2374" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/96171" }, { "trust": 1.7, "url": "https://support.apple.com/ht207518" }, { "trust": 1.1, "url": "http://www.talosintelligence.com/reports/talos-2017-0275/" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037868" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2374" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu99002156/index.html" }, { "trust": 0.8, "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-2374" }, { "trust": 0.3, "url": "https://www.apple.com/" }, { "trust": 0.3, "url": "http://www.apple.com/in/mac/garageband/" }, { "trust": 0.3, "url": "https://support.apple.com/en-us/ht207519" }, { "trust": 0.3, "url": "https://support.apple.com/en-us/ht207518" }, { "trust": 0.2, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2374" }, { "trust": 0.2, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.2, "url": "https://gpgtools.org" } ], "sources": [ { "db": "VULHUB", "id": "VHN-110577" }, { "db": "BID", "id": "96171" }, { "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "db": "PACKETSTORM", "id": "141290" }, { "db": "PACKETSTORM", "id": "141291" }, { "db": "CNNVD", "id": "CNNVD-201702-650" }, { "db": "NVD", "id": "CVE-2017-2374" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-110577" }, { "db": "BID", "id": "96171" }, { "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "db": "PACKETSTORM", "id": "141290" }, { "db": "PACKETSTORM", "id": "141291" }, { "db": "CNNVD", "id": "CNNVD-201702-650" }, { "db": "NVD", "id": "CVE-2017-2374" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-02-20T00:00:00", "db": "VULHUB", "id": "VHN-110577" }, { "date": "2017-02-13T00:00:00", "db": "BID", "id": "96171" }, { "date": "2017-02-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "date": "2017-02-24T01:20:10", "db": "PACKETSTORM", "id": "141290" }, { "date": "2017-02-24T01:22:37", "db": "PACKETSTORM", "id": "141291" }, { "date": "2017-02-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-650" }, { "date": "2017-02-20T08:59:05.463000", "db": "NVD", "id": "CVE-2017-2374" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-07-25T00:00:00", "db": "VULHUB", "id": "VHN-110577" }, { "date": "2017-03-07T02:06:00", "db": "BID", "id": "96171" }, { "date": "2017-02-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001449" }, { "date": "2017-02-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201702-650" }, { "date": "2024-11-21T03:23:23.927000", "db": "NVD", "id": "CVE-2017-2374" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-650" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple GarageBand and Logic Pro X Update for vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001449" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201702-650" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.