Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-2502 (GCVE-0-2017-2502)
Vulnerability from cvelistv5 – Published: 2017-05-22 04:54 – Updated: 2024-08-05 13:55- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T13:55:06.009Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1038484",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038484"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/HT207797"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/HT207800"
},
{
"name": "98468",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/98468"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/HT207798"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/HT207801"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-05-15T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-07T09:57:01",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"name": "1038484",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1038484"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/HT207797"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/HT207800"
},
{
"name": "98468",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/98468"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/HT207798"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/HT207801"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2017-2502",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1038484",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038484"
},
{
"name": "https://support.apple.com/HT207797",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207797"
},
{
"name": "https://support.apple.com/HT207800",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207800"
},
{
"name": "98468",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98468"
},
{
"name": "https://support.apple.com/HT207798",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207798"
},
{
"name": "https://support.apple.com/HT207801",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207801"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2017-2502",
"datePublished": "2017-05-22T04:54:00",
"dateReserved": "2016-12-01T00:00:00",
"dateUpdated": "2024-08-05T13:55:06.009Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.3.2\", \"matchCriteriaId\": \"708FF05D-EDB2-4CE2-B689-F79A0A80CAF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.12.5\", \"matchCriteriaId\": \"4FBED4E2-D14C-4884-99A4-8DD729D4EE3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"10.2.1\", \"matchCriteriaId\": \"5118C36B-1C20-4481-8207-0E4435D60DAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"3.2.2\", \"matchCriteriaId\": \"69FDE126-98A5-4BA8-B963-0D1B5EB008A0\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \\\"CoreAudio\\\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.\"}, {\"lang\": \"es\", \"value\": \"Fue encontrado un problema en ciertos productos de Apple. iOS versi\\u00f3n anterior a 10.3.2 se ve afectado. MacOS versi\\u00f3n anterior a10.12.5 se ve afectado. TVOS versi\\u00f3n anterior a 10.2.1 se ve afectado. WatchOS versi\\u00f3n anterior a 3.2.2 se ve afectado. El tema involucra el componente \\\"CoreAudio\\\". Permite a los atacantes omitir las restricciones de lectura de memoria previstas por medio de una aplicaci\\u00f3n creada.\"}]",
"id": "CVE-2017-2502",
"lastModified": "2024-11-21T03:23:39.383",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:N/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2017-05-22T05:29:00.567",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/98468\", \"source\": \"product-security@apple.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038484\", \"source\": \"product-security@apple.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://support.apple.com/HT207797\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/HT207798\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/HT207800\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/HT207801\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/98468\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038484\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://support.apple.com/HT207797\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/HT207798\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/HT207800\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://support.apple.com/HT207801\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-2502\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2017-05-22T05:29:00.567\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \\\"CoreAudio\\\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.\"},{\"lang\":\"es\",\"value\":\"Fue encontrado un problema en ciertos productos de Apple. iOS versi\u00f3n anterior a 10.3.2 se ve afectado. MacOS versi\u00f3n anterior a10.12.5 se ve afectado. TVOS versi\u00f3n anterior a 10.2.1 se ve afectado. WatchOS versi\u00f3n anterior a 3.2.2 se ve afectado. El tema involucra el componente \\\"CoreAudio\\\". Permite a los atacantes omitir las restricciones de lectura de memoria previstas por medio de una aplicaci\u00f3n creada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.3.2\",\"matchCriteriaId\":\"708FF05D-EDB2-4CE2-B689-F79A0A80CAF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.12.5\",\"matchCriteriaId\":\"4FBED4E2-D14C-4884-99A4-8DD729D4EE3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.2.1\",\"matchCriteriaId\":\"5118C36B-1C20-4481-8207-0E4435D60DAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.2.2\",\"matchCriteriaId\":\"69FDE126-98A5-4BA8-B963-0D1B5EB008A0\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/98468\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038484\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://support.apple.com/HT207797\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/HT207798\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/HT207800\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/HT207801\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/98468\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038484\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://support.apple.com/HT207797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/HT207798\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/HT207800\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/HT207801\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CNVD-2017-07735
Vulnerability from cnvd - Published: 2017-05-31目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: https://support.apple.com/HT207797
| Name | ['Apple IOS <10.3.2', 'Apple tvOS <10.2.1', 'Apple watchOS <3.2.2', 'Apple macOS <10.12.5'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "98468"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-2502"
}
},
"description": "Apple iOS\u7b49\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Apple iOS\u662f\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\uff1btvOS\u662f\u4e00\u5957\u667a\u80fd\u7535\u89c6\u64cd\u4f5c\u7cfb\u7edf\u3002CoreAudio\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u6838\u5fc3\u97f3\u9891\u7ec4\u4ef6\u3002\r\n\r\n\u591a\u6b3eApple\u4ea7\u54c1\u4e2d\u7684CoreAudio\u7ec4\u4ef6\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5185\u5b58\u8bfb\u53d6\u9650\u5236\uff0c\u8bfb\u53d6\u5185\u5b58\u3002",
"discovererName": "Yangkang (@dnpushme)",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://support.apple.com/HT207797",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-07735",
"openTime": "2017-05-31",
"patchDescription": "Apple iOS\u7b49\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Apple iOS\u662f\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\uff1btvOS\u662f\u4e00\u5957\u667a\u80fd\u7535\u89c6\u64cd\u4f5c\u7cfb\u7edf\u3002CoreAudio\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u6838\u5fc3\u97f3\u9891\u7ec4\u4ef6\u3002\r\n\r\n\u591a\u6b3eApple\u4ea7\u54c1\u4e2d\u7684CoreAudio\u7ec4\u4ef6\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5185\u5b58\u8bfb\u53d6\u9650\u5236\uff0c\u8bfb\u53d6\u5185\u5b58\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eApple\u4ea7\u54c1CoreAudio\u7ec4\u4ef6\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Apple IOS \u003c10.3.2",
"Apple tvOS \u003c10.2.1",
"Apple watchOS \u003c3.2.2",
"Apple macOS \u003c10.12.5"
]
},
"referenceLink": "https://support.apple.com/HT207798\r\nhttps://support.apple.com/HT207800\r\nhttps://support.apple.com/HT207801",
"serverity": "\u4e2d",
"submitTime": "2017-05-24",
"title": "\u591a\u6b3eApple\u4ea7\u54c1CoreAudio\u7ec4\u4ef6\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}
FKIE_CVE-2017-2502
Vulnerability from fkie_nvd - Published: 2017-05-22 05:29 - Updated: 2025-04-20 01:37{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "708FF05D-EDB2-4CE2-B689-F79A0A80CAF2",
"versionEndExcluding": "10.3.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4FBED4E2-D14C-4884-99A4-8DD729D4EE3E",
"versionEndExcluding": "10.12.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5118C36B-1C20-4481-8207-0E4435D60DAA",
"versionEndExcluding": "10.2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69FDE126-98A5-4BA8-B963-0D1B5EB008A0",
"versionEndExcluding": "3.2.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app."
},
{
"lang": "es",
"value": "Fue encontrado un problema en ciertos productos de Apple. iOS versi\u00f3n anterior a 10.3.2 se ve afectado. MacOS versi\u00f3n anterior a10.12.5 se ve afectado. TVOS versi\u00f3n anterior a 10.2.1 se ve afectado. WatchOS versi\u00f3n anterior a 3.2.2 se ve afectado. El tema involucra el componente \"CoreAudio\". Permite a los atacantes omitir las restricciones de lectura de memoria previstas por medio de una aplicaci\u00f3n creada."
}
],
"id": "CVE-2017-2502",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-05-22T05:29:00.567",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/98468"
},
{
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038484"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207797"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207798"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207800"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207801"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/98468"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038484"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207797"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207798"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207800"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207801"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2017-AVI-155
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2.1 | ||
| Apple | N/A | tvOS versions antérieures à 10.2.1 | ||
| Apple | N/A | watchOS versions antérieures à 3.2.2 | ||
| Apple | N/A | El Capitan sans le correctif de sécurité 2017-002 | ||
| Apple | N/A | iOS versions antérieures à 10.3.2 | ||
| Apple | N/A | Yosemite sans le correctif de sécurité 2017-002 | ||
| Apple | Safari | Safari versions antérieures à 10.1.1 | ||
| Apple | N/A | iTunes versions antérieures à 12.6.1 sur Windows | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "El Capitan sans le correctif de s\u00e9curit\u00e9 2017-002",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Yosemite sans le correctif de s\u00e9curit\u00e9 2017-002",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.6.1 sur Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.5",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2541"
},
{
"name": "CVE-2017-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2494"
},
{
"name": "CVE-2017-2545",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2545"
},
{
"name": "CVE-2017-2540",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2540"
},
{
"name": "CVE-2017-6989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6989"
},
{
"name": "CVE-2017-6983",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6983"
},
{
"name": "CVE-2017-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2520"
},
{
"name": "CVE-2017-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2518"
},
{
"name": "CVE-2017-2514",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2514"
},
{
"name": "CVE-2017-2528",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2528"
},
{
"name": "CVE-2017-2508",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2508"
},
{
"name": "CVE-2017-2524",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2524"
},
{
"name": "CVE-2017-2496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2496"
},
{
"name": "CVE-2017-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2535"
},
{
"name": "CVE-2017-6979",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6979"
},
{
"name": "CVE-2017-2548",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2548"
},
{
"name": "CVE-2017-2527",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2527"
},
{
"name": "CVE-2017-2544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2544"
},
{
"name": "CVE-2017-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2511"
},
{
"name": "CVE-2017-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2519"
},
{
"name": "CVE-2017-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6988"
},
{
"name": "CVE-2017-2516",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2516"
},
{
"name": "CVE-2017-2507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2507"
},
{
"name": "CVE-2017-2499",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2499"
},
{
"name": "CVE-2017-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2510"
},
{
"name": "CVE-2017-6990",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6990"
},
{
"name": "CVE-2017-2531",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2531"
},
{
"name": "CVE-2017-2534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2534"
},
{
"name": "CVE-2017-2525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2525"
},
{
"name": "CVE-2017-6986",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6986"
},
{
"name": "CVE-2017-2547",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2547"
},
{
"name": "CVE-2017-2538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2538"
},
{
"name": "CVE-2017-6978",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6978"
},
{
"name": "CVE-2017-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2530"
},
{
"name": "CVE-2017-6991",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6991"
},
{
"name": "CVE-2017-6985",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6985"
},
{
"name": "CVE-2017-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2526"
},
{
"name": "CVE-2017-6984",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6984"
},
{
"name": "CVE-2017-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2533"
},
{
"name": "CVE-2017-2543",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2543"
},
{
"name": "CVE-2017-2504",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2504"
},
{
"name": "CVE-2017-6980",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6980"
},
{
"name": "CVE-2017-2515",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2515"
},
{
"name": "CVE-2017-2542",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2542"
},
{
"name": "CVE-2017-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2495"
},
{
"name": "CVE-2017-2549",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2549"
},
{
"name": "CVE-2017-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2503"
},
{
"name": "CVE-2017-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2502"
},
{
"name": "CVE-2017-6982",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6982"
},
{
"name": "CVE-2017-2506",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2506"
},
{
"name": "CVE-2017-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2536"
},
{
"name": "CVE-2017-6977",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6977"
},
{
"name": "CVE-2017-2500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2500"
},
{
"name": "CVE-2017-6981",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6981"
},
{
"name": "CVE-2017-6987",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6987"
},
{
"name": "CVE-2017-2546",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2546"
},
{
"name": "CVE-2017-2512",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2512"
},
{
"name": "CVE-2017-2501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2501"
},
{
"name": "CVE-2017-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2513"
},
{
"name": "CVE-2017-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2539"
},
{
"name": "CVE-2017-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2509"
},
{
"name": "CVE-2017-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2521"
},
{
"name": "CVE-2017-2505",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2505"
},
{
"name": "CVE-2017-2498",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2498"
},
{
"name": "CVE-2017-2497",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2497"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-155",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-05-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207801 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207800 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207800"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207805 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207805"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207798 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207804 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207797 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207797"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207803 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207803"
}
]
}
CERTFR-2017-AVI-155
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2.1 | ||
| Apple | N/A | tvOS versions antérieures à 10.2.1 | ||
| Apple | N/A | watchOS versions antérieures à 3.2.2 | ||
| Apple | N/A | El Capitan sans le correctif de sécurité 2017-002 | ||
| Apple | N/A | iOS versions antérieures à 10.3.2 | ||
| Apple | N/A | Yosemite sans le correctif de sécurité 2017-002 | ||
| Apple | Safari | Safari versions antérieures à 10.1.1 | ||
| Apple | N/A | iTunes versions antérieures à 12.6.1 sur Windows | ||
| Apple | macOS | macOS Sierra versions antérieures à 10.12.5 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "El Capitan sans le correctif de s\u00e9curit\u00e9 2017-002",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Yosemite sans le correctif de s\u00e9curit\u00e9 2017-002",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes versions ant\u00e9rieures \u00e0 12.6.1 sur Windows",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra versions ant\u00e9rieures \u00e0 10.12.5",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2541"
},
{
"name": "CVE-2017-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2494"
},
{
"name": "CVE-2017-2545",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2545"
},
{
"name": "CVE-2017-2540",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2540"
},
{
"name": "CVE-2017-6989",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6989"
},
{
"name": "CVE-2017-6983",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6983"
},
{
"name": "CVE-2017-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2520"
},
{
"name": "CVE-2017-2518",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2518"
},
{
"name": "CVE-2017-2514",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2514"
},
{
"name": "CVE-2017-2528",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2528"
},
{
"name": "CVE-2017-2508",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2508"
},
{
"name": "CVE-2017-2524",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2524"
},
{
"name": "CVE-2017-2496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2496"
},
{
"name": "CVE-2017-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2535"
},
{
"name": "CVE-2017-6979",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6979"
},
{
"name": "CVE-2017-2548",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2548"
},
{
"name": "CVE-2017-2527",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2527"
},
{
"name": "CVE-2017-2544",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2544"
},
{
"name": "CVE-2017-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2511"
},
{
"name": "CVE-2017-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2519"
},
{
"name": "CVE-2017-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6988"
},
{
"name": "CVE-2017-2516",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2516"
},
{
"name": "CVE-2017-2507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2507"
},
{
"name": "CVE-2017-2499",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2499"
},
{
"name": "CVE-2017-2510",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2510"
},
{
"name": "CVE-2017-6990",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6990"
},
{
"name": "CVE-2017-2531",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2531"
},
{
"name": "CVE-2017-2534",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2534"
},
{
"name": "CVE-2017-2525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2525"
},
{
"name": "CVE-2017-6986",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6986"
},
{
"name": "CVE-2017-2547",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2547"
},
{
"name": "CVE-2017-2538",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2538"
},
{
"name": "CVE-2017-6978",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6978"
},
{
"name": "CVE-2017-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2530"
},
{
"name": "CVE-2017-6991",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6991"
},
{
"name": "CVE-2017-6985",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6985"
},
{
"name": "CVE-2017-2526",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2526"
},
{
"name": "CVE-2017-6984",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6984"
},
{
"name": "CVE-2017-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2533"
},
{
"name": "CVE-2017-2543",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2543"
},
{
"name": "CVE-2017-2504",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2504"
},
{
"name": "CVE-2017-6980",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6980"
},
{
"name": "CVE-2017-2515",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2515"
},
{
"name": "CVE-2017-2542",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2542"
},
{
"name": "CVE-2017-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2495"
},
{
"name": "CVE-2017-2549",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2549"
},
{
"name": "CVE-2017-2503",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2503"
},
{
"name": "CVE-2017-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2502"
},
{
"name": "CVE-2017-6982",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6982"
},
{
"name": "CVE-2017-2506",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2506"
},
{
"name": "CVE-2017-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2536"
},
{
"name": "CVE-2017-6977",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6977"
},
{
"name": "CVE-2017-2500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2500"
},
{
"name": "CVE-2017-6981",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6981"
},
{
"name": "CVE-2017-6987",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6987"
},
{
"name": "CVE-2017-2546",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2546"
},
{
"name": "CVE-2017-2512",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2512"
},
{
"name": "CVE-2017-2501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2501"
},
{
"name": "CVE-2017-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2513"
},
{
"name": "CVE-2017-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2539"
},
{
"name": "CVE-2017-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2509"
},
{
"name": "CVE-2017-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2521"
},
{
"name": "CVE-2017-2505",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2505"
},
{
"name": "CVE-2017-2498",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2498"
},
{
"name": "CVE-2017-2497",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2497"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-155",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-05-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et un contournement de la\npolitique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207801 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207801"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207800 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207800"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207805 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207805"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207798 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207804 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207797 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207797"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207803 du 15 mai 2017",
"url": "https://support.apple.com/en-us/HT207803"
}
]
}
VAR-201705-3384
Vulnerability from variot - Updated: 2023-12-18 10:55An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "CoreAudio" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. plural Apple Product CoreAudio A component contains a vulnerability that bypasses memory read restrictions.An attacker could bypass the memory read limit through a crafted application. Apple iOS/WatchOS/tvOS/macOS are prone to multiple security vulnerabilities. An attacker can exploit these issues to gain elevated privileges, perform unauthorized actions and execute arbitrary code with kernel privileges. Failed exploit attempts will likely cause a denial-of-service condition. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system. CoreAudio is one of the core audio components. The following products and versions are affected: Apple iOS prior to 10.3.2; macOS Sierra prior to 10.12.5; tvOS prior to 10.2.1; watchOS prior to 3.2.2. CVE-2017-2521: lokihardt of Google Project Zero
Installation note:
Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2017-05-15-2 iOS 10.3.2
iOS 10.3.2 is now available and addresses the following:
AVEVideoEncoder Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-6989: Adam Donenfeld (@doadam) of the Zimperium zLabs Team
CoreAudio Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-2502: Yangkang (@dnpushme) of Qihoo360 Qex Team
iBooks Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: A maliciously crafted book may open arbitrary websites without user permission Description: A URL handling issue was addressed through improved state management. CVE-2017-2497: Jun Kokatsu (@shhnjk)
iBooks Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with root privileges Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization. CVE-2017-6981: evi1m0 of YSRC (sec.ly.com)
IOSurface Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-6979: Adam Donenfeld of Zimperium zLabs
Kernel Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed through improved locking. CVE-2017-2501: Ian Beer of Google Project Zero
Kernel Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-2507: Ian Beer of Google Project Zero CVE-2017-6987: Patrick Wardle of Synack
Notifications Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to cause a denial of service Description: A denial of service issue was addressed through improved memory handling. CVE-2017-6982: Vincent Desmurs (vincedes3), Sem Voigtlander (OxFEEDFACE), and Joseph Shenton of CoffeeBreakers
Safari Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Visiting a maliciously crafted webpage may lead to an application denial of service Description: An issue in Safari's history menu was addressed through improved memory handling. CVE-2017-2495: Tubasa Iinuma (@llamakko_cafe) of Gehirn Inc.
Security Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Update to the certificate trust policy Description: A certificate validation issue existed in the handling of untrusted certificates. This issue was addressed through improved user handling of trust acceptance. CVE-2017-2498: Andrew Jerman
SQLite Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A use after free issue was addressed through improved memory management. CVE-2017-2513: found by OSS-Fuzz
SQLite Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-2518: found by OSS-Fuzz CVE-2017-2520: found by OSS-Fuzz
SQLite Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2519: found by OSS-Fuzz
SQLite Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2017-6983: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative CVE-2017-6991: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative
TextInput Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Parsing maliciously crafted data may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2524: Ian Beer of Google Project Zero
WebKit Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2017-2496: Apple CVE-2017-2505: lokihardt of Google Project Zero CVE-2017-2506: Zheng Huang of the Baidu Security Lab working with Trend Microas Zero Day Initiative CVE-2017-2514: lokihardt of Google Project Zero CVE-2017-2515: lokihardt of Google Project Zero CVE-2017-2521: lokihardt of Google Project Zero CVE-2017-2525: Kai Kang (4B5F5F4B) of Tencentas Xuanwu Lab ( tencent.com) working with Trend Microas Zero Day Initiative CVE-2017-2526: Kai Kang (4B5F5F4B) of Tencentas Xuanwu Lab (tencent.com) working with Trend Microas Zero Day Initiative CVE-2017-2530: Wei Yuan of Baidu Security Lab CVE-2017-2531: lokihardt of Google Project Zero CVE-2017-2538: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative CVE-2017-2539: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative CVE-2017-2544: 360 Security (@mj0011sec) working with Trend Micro's Zero Day Initiative CVE-2017-2547: lokihardt of Google Project Zero, Team Sniper (Keen Lab and PC Mgr) working with Trend Micro's Zero Day Initiative CVE-2017-6980: lokihardt of Google Project Zero CVE-2017-6984: lokihardt of Google Project Zero
WebKit Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in the handling of WebKit Editor commands. This issue was addressed with improved state management. CVE-2017-2504: lokihardt of Google Project Zero
WebKit Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in the handling of WebKit container nodes. This issue was addressed with improved state management. CVE-2017-2508: lokihardt of Google Project Zero
WebKit Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in the handling of pageshow events. This issue was addressed with improved state management. CVE-2017-2510: lokihardt of Google Project Zero
WebKit Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in the handling of WebKit cached frames. This issue was addressed with improved state management. CVE-2017-2528: lokihardt of Google Project Zero
WebKit Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues with addressed through improved memory handling. CVE-2017-2536: Samuel GroA and Niklas Baumstark working with Trend Micro's Zero Day Initiative
WebKit Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in frame loading. This issue was addressed with improved state management. CVE-2017-2549: lokihardt of Google Project Zero
WebKit Web Inspector Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to execute unsigned code Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2499: George Dan (@theninjaprawn)
Installation note:
This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. The version after applying this update will be "10.3.2".
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIbBAEBCgAGBQJZGd7rAAoJEIOj74w0bLRGS4kP+Lc6slIXsaBr4WUGGX9bn0ej klXxesL3SNerIMYNK3HUnw/8bM3uhsxKcb8I1OC0lFw3xqtxCs2Mt7qDWOvZ8yvy 7eg55Pbx/YVQUV3fSCTRYsGclHFAVNvw7NxgXJEh27Jb+3pLleLzOlepMwhgstxy REEhMVZrjkzQNEXU14r+o7YePowIezfs9pPBYyT/jQk3z5DH/kxIe9J8nP/4yHU3 1Ygvm/VwgXjdMVzR60WY72D/jahVePFK0gjR0omOsYc7KslOirkJ18arf7MI3iC5 yOVs6zvh17nPvQXJr5rbZivMfD5RWB+iTAFtdlT9vReEDgSjizxn/kiwWWeujOzB ORZmk+BZ0NzSR07sMrINeWmqAhgxKT3D7eCslU/BcRtLoIEsFvje+HgUk7gxoA0U xirgc0nKaB2eNrUxw7GFtV0pWq5fNwdZ2HWQvBL9e73up+XDi9TE/xylUzTGx50b SJl/N491dvIE8BmDUTRlkkTE44SQcATppE76CoLj8y/ncva/Os5KgybZt0Hq0zAV HA8yprCh35iTtqn3D4KyN85XJaLBuYn8nAmF0VQ6ixSekmc6e9RY1vqG7yFXTTkb P9TPLHpbuPGeRenvm/WezkJCQJsUQ64UwT07evtXJfHLuWGCfF4pLIkvfSiVaI8G ucaPHZqagilOIk1zNYk= =26IY -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201705-3384",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mac os x",
"scope": "eq",
"trust": 1.4,
"vendor": "apple",
"version": "10.12.4"
},
{
"model": "mac os x",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.12.5"
},
{
"model": "iphone os",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.3.2"
},
{
"model": "watchos",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "3.2.2"
},
{
"model": "tvos",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.2.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.9,
"vendor": "apple",
"version": "3.2"
},
{
"model": "ios",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "10.3.2 (ipad first 4 generation or later )"
},
{
"model": "ios",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "10.3.2 (iphone 5 or later )"
},
{
"model": "ios",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "10.3.2 (ipod touch first 6 generation )"
},
{
"model": "tvos",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "10.2.1 (apple tv ( first 4 generation ))"
},
{
"model": "watchos",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "3.2.2 (apple watch all models )"
},
{
"model": "tv",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "10.2"
},
{
"model": "iphone os",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "10.3.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.1.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.1.3"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.1.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.2.2"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.2.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.2.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.0"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.2"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.1"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0"
},
{
"model": "watchos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0"
},
{
"model": "watch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.1.1"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.0.1"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.2.2"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.2.1"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.1.1"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.2"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.1"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.0"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.2"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.1"
},
{
"model": "tvos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10"
},
{
"model": "tv",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"model": "macos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.12.4"
},
{
"model": "macos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.12.3"
},
{
"model": "macos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.12.2"
},
{
"model": "macos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.12.1"
},
{
"model": "macos",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.12"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"model": "ipad",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "0"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "50"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "40"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "30"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.2.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.0.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.3.4"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.3.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.3.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.3.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.2.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.0.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.0.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "8.4.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.6"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.5"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.3.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.1.6"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.1.4"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.1.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.0.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.0.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.2.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.2.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.3.5"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "9"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "8.4"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "8.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "8.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "8.1.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "8.1.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "8.1.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "8.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "8"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7.0.4"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "7"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.0.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6.0.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "6"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "5.1.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "5.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "5.0.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "5"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.5"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.4"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.9"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.8"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.7"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.6"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.5"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2.10"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.0"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.3.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.3"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.2"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.1"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10"
},
{
"model": "watchos",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "3.2.2"
},
{
"model": "tvos",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "10.2.1"
},
{
"model": "macos",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "10.12.5"
},
{
"model": "ios",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "10.3.2"
}
],
"sources": [
{
"db": "BID",
"id": "98468"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"db": "NVD",
"id": "CVE-2017-2502"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.3.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.12.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.2.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-2502"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple",
"sources": [
{
"db": "PACKETSTORM",
"id": "142506"
},
{
"db": "PACKETSTORM",
"id": "142510"
},
{
"db": "PACKETSTORM",
"id": "142507"
},
{
"db": "PACKETSTORM",
"id": "142509"
}
],
"trust": 0.4
},
"cve": "CVE-2017-2502",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2017-2502",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.9,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-110705",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 5.5,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-2502",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-2502",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201705-1018",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-110705",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2017-2502",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-110705"
},
{
"db": "VULMON",
"id": "CVE-2017-2502"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"db": "NVD",
"id": "CVE-2017-2502"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. plural Apple Product CoreAudio A component contains a vulnerability that bypasses memory read restrictions.An attacker could bypass the memory read limit through a crafted application. Apple iOS/WatchOS/tvOS/macOS are prone to multiple security vulnerabilities. \nAn attacker can exploit these issues to gain elevated privileges, perform unauthorized actions and execute arbitrary code with kernel privileges. Failed exploit attempts will likely cause a denial-of-service condition. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system. CoreAudio is one of the core audio components. The following products and versions are affected: Apple iOS prior to 10.3.2; macOS Sierra prior to 10.12.5; tvOS prior to 10.2.1; watchOS prior to 3.2.2. \nCVE-2017-2521: lokihardt of Google Project Zero\n\nInstallation note:\n\nInstructions on how to update your Apple Watch software are\navailable at https://support.apple.com/kb/HT204641\n\nTo check the version on your Apple Watch, open the Apple Watch app\non your iPhone and select \"My Watch \u003e General \u003e About\". \n\nAlternatively, on your watch, select \"My Watch \u003e General \u003e About\". -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2017-05-15-2 iOS 10.3.2\n\niOS 10.3.2 is now available and addresses the following:\n\nAVEVideoEncoder\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: An application may be able to gain kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-6989: Adam Donenfeld (@doadam) of the Zimperium zLabs Team\n\nCoreAudio\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-2502: Yangkang (@dnpushme) of Qihoo360 Qex Team\n\niBooks\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: A maliciously crafted book may open arbitrary websites\nwithout user permission\nDescription: A URL handling issue was addressed through improved\nstate management. \nCVE-2017-2497: Jun Kokatsu (@shhnjk)\n\niBooks\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: An application may be able to execute arbitrary code with\nroot privileges\nDescription: An issue existed within the path validation logic for\nsymlinks. This issue was addressed through improved path\nsanitization. \nCVE-2017-6981: evi1m0 of YSRC (sec.ly.com)\n\nIOSurface\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: An application may be able to gain kernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-6979: Adam Donenfeld of Zimperium zLabs\n\nKernel\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A race condition was addressed through improved locking. \nCVE-2017-2501: Ian Beer of Google Project Zero\n\nKernel\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A validation issue was addressed with improved input\nsanitization. \nCVE-2017-2507: Ian Beer of Google Project Zero\nCVE-2017-6987: Patrick Wardle of Synack\n\nNotifications\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: An application may be able to cause a denial of service\nDescription: A denial of service issue was addressed through improved\nmemory handling. \nCVE-2017-6982: Vincent Desmurs (vincedes3), Sem Voigtlander\n(OxFEEDFACE), and Joseph Shenton of CoffeeBreakers\n\nSafari\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Visiting a maliciously crafted webpage may lead to an\napplication denial of service\nDescription: An issue in Safari\u0027s history menu was addressed through\nimproved memory handling. \nCVE-2017-2495: Tubasa Iinuma (@llamakko_cafe) of Gehirn Inc. \n\nSecurity\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Update to the certificate trust policy\nDescription: A certificate validation issue existed in the handling\nof untrusted certificates. This issue was addressed through improved\nuser handling of trust acceptance. \nCVE-2017-2498: Andrew Jerman\n\nSQLite\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: A maliciously crafted SQL query may lead to arbitrary code\nexecution\nDescription: A use after free issue was addressed through improved\nmemory management. \nCVE-2017-2513: found by OSS-Fuzz\n\nSQLite\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: A maliciously crafted SQL query may lead to arbitrary code\nexecution\nDescription: A buffer overflow issue was addressed through improved\nmemory handling. \nCVE-2017-2518: found by OSS-Fuzz\nCVE-2017-2520: found by OSS-Fuzz\n\nSQLite\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: A maliciously crafted SQL query may lead to arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2519: found by OSS-Fuzz\n\nSQLite\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved input validation. \nCVE-2017-6983: Chaitin Security Research Lab (@ChaitinTech) working\nwith Trend Micro\u0027s Zero Day Initiative\nCVE-2017-6991: Chaitin Security Research Lab (@ChaitinTech) working\nwith Trend Micro\u0027s Zero Day Initiative\n\nTextInput\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Parsing maliciously crafted data may lead to arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2524: Ian Beer of Google Project Zero\n\nWebKit\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. \nCVE-2017-2496: Apple\nCVE-2017-2505: lokihardt of Google Project Zero\nCVE-2017-2506: Zheng Huang of the Baidu Security Lab working with\nTrend Microas Zero Day Initiative\nCVE-2017-2514: lokihardt of Google Project Zero\nCVE-2017-2515: lokihardt of Google Project Zero\nCVE-2017-2521: lokihardt of Google Project Zero\nCVE-2017-2525: Kai Kang (4B5F5F4B) of Tencentas Xuanwu Lab (\ntencent.com) working with Trend Microas Zero Day Initiative\nCVE-2017-2526: Kai Kang (4B5F5F4B) of Tencentas Xuanwu Lab\n(tencent.com) working with Trend Microas Zero Day Initiative\nCVE-2017-2530: Wei Yuan of Baidu Security Lab\nCVE-2017-2531: lokihardt of Google Project Zero\nCVE-2017-2538: Richard Zhu (fluorescence) working with Trend Micro\u0027s\nZero Day Initiative\nCVE-2017-2539: Richard Zhu (fluorescence) working with Trend Micro\u0027s\nZero Day Initiative\nCVE-2017-2544: 360 Security (@mj0011sec) working with Trend Micro\u0027s\nZero Day Initiative\nCVE-2017-2547: lokihardt of Google Project Zero,\nTeam Sniper (Keen Lab and PC Mgr) working with Trend Micro\u0027s Zero Day\nInitiative\nCVE-2017-6980: lokihardt of Google Project Zero\nCVE-2017-6984: lokihardt of Google Project Zero\n\nWebKit\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\nuniversal cross site scripting\nDescription: A logic issue existed in the handling of WebKit Editor\ncommands. This issue was addressed with improved state management. \nCVE-2017-2504: lokihardt of Google Project Zero\n\nWebKit\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\nuniversal cross site scripting\nDescription: A logic issue existed in the handling of WebKit\ncontainer nodes. This issue was addressed with improved state\nmanagement. \nCVE-2017-2508: lokihardt of Google Project Zero\n\nWebKit\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\nuniversal cross site scripting\nDescription: A logic issue existed in the handling of pageshow\nevents. This issue was addressed with improved state management. \nCVE-2017-2510: lokihardt of Google Project Zero\n\nWebKit\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\nuniversal cross site scripting\nDescription: A logic issue existed in the handling of WebKit cached\nframes. This issue was addressed with improved state management. \nCVE-2017-2528: lokihardt of Google Project Zero\n\nWebKit\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues with addressed through\nimproved memory handling. \nCVE-2017-2536: Samuel GroA and Niklas Baumstark working with Trend\nMicro\u0027s Zero Day Initiative\n\nWebKit\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: Processing maliciously crafted web content may lead to\nuniversal cross site scripting\nDescription: A logic issue existed in frame loading. This issue was\naddressed with improved state management. \nCVE-2017-2549: lokihardt of Google Project Zero\n\nWebKit Web Inspector\nAvailable for: iPhone 5 and later, iPad 4th generation and later,\nand iPod touch 6th generation\nImpact: An application may be able to execute unsigned code\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2017-2499: George Dan (@theninjaprawn)\n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom https://www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update\nwill be \"10.3.2\". \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n\niQIbBAEBCgAGBQJZGd7rAAoJEIOj74w0bLRGS4kP+Lc6slIXsaBr4WUGGX9bn0ej\nklXxesL3SNerIMYNK3HUnw/8bM3uhsxKcb8I1OC0lFw3xqtxCs2Mt7qDWOvZ8yvy\n7eg55Pbx/YVQUV3fSCTRYsGclHFAVNvw7NxgXJEh27Jb+3pLleLzOlepMwhgstxy\nREEhMVZrjkzQNEXU14r+o7YePowIezfs9pPBYyT/jQk3z5DH/kxIe9J8nP/4yHU3\n1Ygvm/VwgXjdMVzR60WY72D/jahVePFK0gjR0omOsYc7KslOirkJ18arf7MI3iC5\nyOVs6zvh17nPvQXJr5rbZivMfD5RWB+iTAFtdlT9vReEDgSjizxn/kiwWWeujOzB\nORZmk+BZ0NzSR07sMrINeWmqAhgxKT3D7eCslU/BcRtLoIEsFvje+HgUk7gxoA0U\nxirgc0nKaB2eNrUxw7GFtV0pWq5fNwdZ2HWQvBL9e73up+XDi9TE/xylUzTGx50b\nSJl/N491dvIE8BmDUTRlkkTE44SQcATppE76CoLj8y/ncva/Os5KgybZt0Hq0zAV\nHA8yprCh35iTtqn3D4KyN85XJaLBuYn8nAmF0VQ6ixSekmc6e9RY1vqG7yFXTTkb\nP9TPLHpbuPGeRenvm/WezkJCQJsUQ64UwT07evtXJfHLuWGCfF4pLIkvfSiVaI8G\nucaPHZqagilOIk1zNYk=\n=26IY\n-----END PGP SIGNATURE-----\n\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-2502"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"db": "BID",
"id": "98468"
},
{
"db": "VULHUB",
"id": "VHN-110705"
},
{
"db": "VULMON",
"id": "CVE-2017-2502"
},
{
"db": "PACKETSTORM",
"id": "142506"
},
{
"db": "PACKETSTORM",
"id": "142510"
},
{
"db": "PACKETSTORM",
"id": "142507"
},
{
"db": "PACKETSTORM",
"id": "142509"
}
],
"trust": 2.43
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-2502",
"trust": 3.3
},
{
"db": "BID",
"id": "98468",
"trust": 2.1
},
{
"db": "SECTRACK",
"id": "1038484",
"trust": 1.8
},
{
"db": "JVN",
"id": "JVNVU98089541",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003796",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1018",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-110705",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2017-2502",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142506",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142510",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142507",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "142509",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-110705"
},
{
"db": "VULMON",
"id": "CVE-2017-2502"
},
{
"db": "BID",
"id": "98468"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"db": "PACKETSTORM",
"id": "142506"
},
{
"db": "PACKETSTORM",
"id": "142510"
},
{
"db": "PACKETSTORM",
"id": "142507"
},
{
"db": "PACKETSTORM",
"id": "142509"
},
{
"db": "NVD",
"id": "CVE-2017-2502"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
]
},
"id": "VAR-201705-3384",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-110705"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T10:55:36.488000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Apple security updates",
"trust": 0.8,
"url": "https://support.apple.com/en-us/ht201222"
},
{
"title": "HT207800",
"trust": 0.8,
"url": "https://support.apple.com/en-us/ht207800"
},
{
"title": "HT207801",
"trust": 0.8,
"url": "https://support.apple.com/en-us/ht207801"
},
{
"title": "HT207797",
"trust": 0.8,
"url": "https://support.apple.com/en-us/ht207797"
},
{
"title": "HT207798",
"trust": 0.8,
"url": "https://support.apple.com/en-us/ht207798"
},
{
"title": "HT207797",
"trust": 0.8,
"url": "https://support.apple.com/ja-jp/ht207797"
},
{
"title": "HT207798",
"trust": 0.8,
"url": "https://support.apple.com/ja-jp/ht207798"
},
{
"title": "HT207800",
"trust": 0.8,
"url": "https://support.apple.com/ja-jp/ht207800"
},
{
"title": "HT207801",
"trust": 0.8,
"url": "https://support.apple.com/ja-jp/ht207801"
},
{
"title": "Multiple Apple product CoreAudio Fixes for component security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=70494"
},
{
"title": "Apple: watchOS 3.2.2",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=4236e7056e9c2ca6856920bda32651dc"
},
{
"title": "Apple: macOS Sierra 10.12.5, Security Update 2017-002 El Capitan, and Security Update 2017-002 Yosemite",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=a85d2562c7bfeef27c008c1b42b57ce3"
},
{
"title": "Apple: tvOS 10.2.1",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=f15179e35546195f4a2af201b3bbc150"
},
{
"title": "Apple: iOS 10.3.2",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=02bdc4f27af21fbb8c501e6519ce979a"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2017-2502"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-284",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-110705"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"db": "NVD",
"id": "CVE-2017-2502"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.4,
"url": "http://www.securityfocus.com/bid/98468"
},
{
"trust": 1.8,
"url": "https://support.apple.com/ht207797"
},
{
"trust": 1.8,
"url": "https://support.apple.com/ht207798"
},
{
"trust": 1.8,
"url": "https://support.apple.com/ht207800"
},
{
"trust": 1.8,
"url": "https://support.apple.com/ht207801"
},
{
"trust": 1.8,
"url": "http://www.securitytracker.com/id/1038484"
},
{
"trust": 1.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2502"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2502"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu98089541/index.html"
},
{
"trust": 0.4,
"url": "https://support.apple.com/kb/ht201222"
},
{
"trust": 0.4,
"url": "https://gpgtools.org"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2520"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2519"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2507"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2518"
},
{
"trust": 0.4,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2513"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2524"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2501"
},
{
"trust": 0.3,
"url": "https://www.apple.com/"
},
{
"trust": 0.3,
"url": "http://www.apple.com/ios/"
},
{
"trust": 0.3,
"url": "http://www.apple.com/accessibility/tvos/"
},
{
"trust": 0.3,
"url": "http://www.apple.com/watchos-2/"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2521"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2497"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6979"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6989"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6987"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2531"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2506"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2504"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2505"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2530"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2525"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2499"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2536"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2515"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://support.apple.com/kb/ht207800"
},
{
"trust": 0.1,
"url": "https://tools.cisco.com/security/center/viewalert.x?alertid=53836"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2509"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2542"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2548"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6978"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2516"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2545"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2543"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2535"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2533"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2494"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2546"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2537"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2540"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6977"
},
{
"trust": 0.1,
"url": "https://www.apple.com/support/downloads/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2527"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2534"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2512"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2541"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2503"
},
{
"trust": 0.1,
"url": "https://support.apple.com/kb/ht204641"
},
{
"trust": 0.1,
"url": "https://www.apple.com/itunes/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2514"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2528"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2538"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2508"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2526"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2496"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2498"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2510"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2495"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6984"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-2549"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-6980"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-110705"
},
{
"db": "VULMON",
"id": "CVE-2017-2502"
},
{
"db": "BID",
"id": "98468"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"db": "PACKETSTORM",
"id": "142506"
},
{
"db": "PACKETSTORM",
"id": "142510"
},
{
"db": "PACKETSTORM",
"id": "142507"
},
{
"db": "PACKETSTORM",
"id": "142509"
},
{
"db": "NVD",
"id": "CVE-2017-2502"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-110705"
},
{
"db": "VULMON",
"id": "CVE-2017-2502"
},
{
"db": "BID",
"id": "98468"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"db": "PACKETSTORM",
"id": "142506"
},
{
"db": "PACKETSTORM",
"id": "142510"
},
{
"db": "PACKETSTORM",
"id": "142507"
},
{
"db": "PACKETSTORM",
"id": "142509"
},
{
"db": "NVD",
"id": "CVE-2017-2502"
},
{
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-05-22T00:00:00",
"db": "VULHUB",
"id": "VHN-110705"
},
{
"date": "2017-05-22T00:00:00",
"db": "VULMON",
"id": "CVE-2017-2502"
},
{
"date": "2017-05-15T00:00:00",
"db": "BID",
"id": "98468"
},
{
"date": "2017-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"date": "2017-05-15T13:02:22",
"db": "PACKETSTORM",
"id": "142506"
},
{
"date": "2017-05-15T23:23:23",
"db": "PACKETSTORM",
"id": "142510"
},
{
"date": "2017-05-15T14:44:44",
"db": "PACKETSTORM",
"id": "142507"
},
{
"date": "2017-05-15T19:32:22",
"db": "PACKETSTORM",
"id": "142509"
},
{
"date": "2017-05-22T05:29:00.567000",
"db": "NVD",
"id": "CVE-2017-2502"
},
{
"date": "2017-05-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-110705"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULMON",
"id": "CVE-2017-2502"
},
{
"date": "2017-05-23T16:28:00",
"db": "BID",
"id": "98468"
},
{
"date": "2017-06-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-003796"
},
{
"date": "2019-10-03T00:03:26.223000",
"db": "NVD",
"id": "CVE-2017-2502"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural Apple Product CoreAudio Vulnerability that bypasses memory read restrictions in components",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-003796"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access control error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201705-1018"
}
],
"trust": 0.6
}
}
GHSA-FMPW-3QQ4-W5HP
Vulnerability from github – Published: 2022-05-13 01:44 – Updated: 2022-05-13 01:44An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "CoreAudio" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
{
"affected": [],
"aliases": [
"CVE-2017-2502"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-05-22T05:29:00Z",
"severity": "MODERATE"
},
"details": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.",
"id": "GHSA-fmpw-3qq4-w5hp",
"modified": "2022-05-13T01:44:52Z",
"published": "2022-05-13T01:44:52Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-2502"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT207797"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT207798"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT207800"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT207801"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/98468"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1038484"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2017-2502
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-2502",
"description": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.",
"id": "GSD-2017-2502"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-2502"
],
"details": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.",
"id": "GSD-2017-2502",
"modified": "2023-12-13T01:21:06.123327Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2017-2502",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1038484",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038484"
},
{
"name": "https://support.apple.com/HT207797",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207797"
},
{
"name": "https://support.apple.com/HT207800",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207800"
},
{
"name": "98468",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98468"
},
{
"name": "https://support.apple.com/HT207798",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207798"
},
{
"name": "https://support.apple.com/HT207801",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207801"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.3.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.12.5",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.2.1",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2017-2502"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"CoreAudio\" component. It allows attackers to bypass intended memory-read restrictions via a crafted app."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT207801",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207801"
},
{
"name": "https://support.apple.com/HT207800",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207800"
},
{
"name": "https://support.apple.com/HT207798",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207798"
},
{
"name": "https://support.apple.com/HT207797",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207797"
},
{
"name": "98468",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/98468"
},
{
"name": "1038484",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1038484"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-10-03T00:03Z",
"publishedDate": "2017-05-22T05:29Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.