CERTFR-2017-AVI-155
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2.1 | ||
| Apple | N/A | tvOS versions antérieures à 10.2.1 | ||
| Apple | N/A | watchOS versions antérieures à 3.2.2 | ||
| Apple | N/A | El Capitan sans le correctif de sécurité 2017-002 | ||
| Apple | N/A | iOS versions antérieures à 10.3.2 | ||
| Apple | N/A | Yosemite sans le correctif de sécurité 2017-002 | ||
| Apple | Safari | Safari versions antérieures à 10.1.1 | ||
| Apple | N/A | iTunes versions antérieures à 12.6.1 sur Windows | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.5 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "El Capitan sans le correctif de s\u00e9curit\u00e9 2017-002",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Yosemite sans le correctif de s\u00e9curit\u00e9 2017-002",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.6.1 sur Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.5",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2541"
},
{
"name": "CVE-2017-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2494"
},
{
"name": "CVE-2017-2545",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2545"
},
{
"name": "CVE-2017-2540",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2540"
},
{
"name": "CVE-2017-6989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6989"
},
{
"name": "CVE-2017-6983",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6983"
},
{
"name": "CVE-2017-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2520"
},
{
"name": "CVE-2017-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2518"
},
{
"name": "CVE-2017-2514",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2514"
},
{
"name": "CVE-2017-2528",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2528"
},
{
"name": "CVE-2017-2508",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2508"
},
{
"name": "CVE-2017-2524",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2524"
},
{
"name": "CVE-2017-2496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2496"
},
{
"name": "CVE-2017-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2535"
},
{
"name": "CVE-2017-6979",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6979"
},
{
"name": "CVE-2017-2548",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2548"
},
{
"name": "CVE-2017-2527",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2527"
},
{
"name": "CVE-2017-2544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2544"
},
{
"name": "CVE-2017-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2511"
},
{
"name": "CVE-2017-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2519"
},
{
"name": "CVE-2017-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6988"
},
{
"name": "CVE-2017-2516",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2516"
},
{
"name": "CVE-2017-2507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2507"
},
{
"name": "CVE-2017-2499",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2499"
},
{
"name": "CVE-2017-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2510"
},
{
"name": "CVE-2017-6990",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6990"
},
{
"name": "CVE-2017-2531",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2531"
},
{
"name": "CVE-2017-2534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2534"
},
{
"name": "CVE-2017-2525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2525"
},
{
"name": "CVE-2017-6986",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6986"
},
{
"name": "CVE-2017-2547",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2547"
},
{
"name": "CVE-2017-2538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2538"
},
{
"name": "CVE-2017-6978",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6978"
},
{
"name": "CVE-2017-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2530"
},
{
"name": "CVE-2017-6991",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6991"
},
{
"name": "CVE-2017-6985",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6985"
},
{
"name": "CVE-2017-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2526"
},
{
"name": "CVE-2017-6984",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6984"
},
{
"name": "CVE-2017-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2533"
},
{
"name": "CVE-2017-2543",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2543"
},
{
"name": "CVE-2017-2504",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2504"
},
{
"name": "CVE-2017-6980",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6980"
},
{
"name": "CVE-2017-2515",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2515"
},
{
"name": "CVE-2017-2542",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2542"
},
{
"name": "CVE-2017-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2495"
},
{
"name": "CVE-2017-2549",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2549"
},
{
"name": "CVE-2017-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2503"
},
{
"name": "CVE-2017-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2502"
},
{
"name": "CVE-2017-6982",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6982"
},
{
"name": "CVE-2017-2506",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2506"
},
{
"name": "CVE-2017-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2536"
},
{
"name": "CVE-2017-6977",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6977"
},
{
"name": "CVE-2017-2500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2500"
},
{
"name": "CVE-2017-6981",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6981"
},
{
"name": "CVE-2017-6987",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6987"
},
{
"name": "CVE-2017-2546",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2546"
},
{
"name": "CVE-2017-2512",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2512"
},
{
"name": "CVE-2017-2501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2501"
},
{
"name": "CVE-2017-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2513"
},
{
"name": "CVE-2017-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2539"
},
{
"name": "CVE-2017-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2509"
},
{
"name": "CVE-2017-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2521"
},
{
"name": "CVE-2017-2505",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2505"
},
{
"name": "CVE-2017-2498",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2498"
},
{
"name": "CVE-2017-2497",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2497"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-155",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-05-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207801 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207800 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207800"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207805 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207805"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207798 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207804 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207797 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207797"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207803 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207803"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…