Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-7053 (GCVE-0-2017-7053)
Vulnerability from cvelistv5 – Published: 2017-07-20 16:00 – Updated: 2024-08-05 15:49- n/a
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:49:02.889Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/HT207928"
},
{
"name": "99884",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/99884"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-07-19T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \"iTunes\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-21T09:57:01",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/HT207928"
},
{
"name": "99884",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/99884"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2017-7053",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \"iTunes\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT207928",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207928"
},
{
"name": "99884",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99884"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2017-7053",
"datePublished": "2017-07-20T16:00:00",
"dateReserved": "2017-03-17T00:00:00",
"dateUpdated": "2024-08-05T15:49:02.889Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"12.6.1\", \"matchCriteriaId\": \"B5211EFA-1504-463B-AC5C-35EA9DD5B152\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \\\"iTunes\\\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.\"}, {\"lang\": \"es\", \"value\": \"Fue detectado un problema en ciertos productos de Apple. iTunes versi\\u00f3n anterior a 12.6.2 en Windows se ve afectado. El tema involucra el componente \\\"iTunes\\\". Permite a los atacantes ejecutar un c\\u00f3digo arbitrario en un contexto privilegiado por medio de una aplicaci\\u00f3n creada.\"}]",
"id": "CVE-2017-7053",
"lastModified": "2024-11-21T03:31:03.763",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:C/I:C/A:C\", \"baseScore\": 9.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.6, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2017-07-20T16:29:02.113",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/99884\", \"source\": \"product-security@apple.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://support.apple.com/HT207928\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/99884\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://support.apple.com/HT207928\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-7053\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2017-07-20T16:29:02.113\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \\\"iTunes\\\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.\"},{\"lang\":\"es\",\"value\":\"Fue detectado un problema en ciertos productos de Apple. iTunes versi\u00f3n anterior a 12.6.2 en Windows se ve afectado. El tema involucra el componente \\\"iTunes\\\". Permite a los atacantes ejecutar un c\u00f3digo arbitrario en un contexto privilegiado por medio de una aplicaci\u00f3n creada.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"12.6.1\",\"matchCriteriaId\":\"B5211EFA-1504-463B-AC5C-35EA9DD5B152\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/99884\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://support.apple.com/HT207928\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99884\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://support.apple.com/HT207928\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CNVD-2017-16987
Vulnerability from cnvd - Published: 2017-07-27目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://support.apple.com/zh-cn/HT207928
| Name | Apple iTunes(on Windows) <12.6.2 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2017-7053"
}
},
"description": "Apple iTunes for Windows\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4e00\u5957\u57fa\u4e8eWindows\u5e73\u53f0\u7684\u5a92\u4f53\u64ad\u653e\u5668\u5e94\u7528\u7a0b\u5e8f\uff0c\u5b83\u4e3b\u8981\u7528\u4e8e\u5bf9\u6570\u5b57\u97f3\u4e50\u548c\u89c6\u9891\u6587\u4ef6\u8fdb\u884c\u64ad\u653e\u4ee5\u53ca\u7ba1\u7406\u3002\r\n\r\n\u57fa\u4e8eWindows\u5e73\u53f0\u7684Apple iTunes 12.6.2\u4e4b\u524d\u7684\u7248\u672c\u4e2diTunes\u7ec4\u4ef6\u5b58\u5728\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5\u7cfb\u7edf\u6743\u9650\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "Trend Micro",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://support.apple.com/zh-cn/HT207928",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-16987",
"openTime": "2017-07-27",
"patchDescription": "Apple iTunes for Windows\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4e00\u5957\u57fa\u4e8eWindows\u5e73\u53f0\u7684\u5a92\u4f53\u64ad\u653e\u5668\u5e94\u7528\u7a0b\u5e8f\uff0c\u5b83\u4e3b\u8981\u7528\u4e8e\u5bf9\u6570\u5b57\u97f3\u4e50\u548c\u89c6\u9891\u6587\u4ef6\u8fdb\u884c\u64ad\u653e\u4ee5\u53ca\u7ba1\u7406\u3002\r\n\r\n\u57fa\u4e8eWindows\u5e73\u53f0\u7684Apple iTunes 12.6.2\u4e4b\u524d\u7684\u7248\u672c\u4e2diTunes\u7ec4\u4ef6\u5b58\u5728\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u4ee5\u7cfb\u7edf\u6743\u9650\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apple iTunes for Windows iTunes\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Apple iTunes(on Windows) \u003c12.6.2"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2017-7053",
"serverity": "\u9ad8",
"submitTime": "2017-07-21",
"title": "Apple iTunes for Windows iTunes\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
CERTFR-2017-AVI-229
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 3.2.3 | ||
| Apple | N/A | Yosemite sans le correctif de sécurité 2017-003 | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2.2 | ||
| Apple | Safari | Safari versions antérieures à 10.1.2 | ||
| Apple | macOS | macOS Sierra verions antérieures à 10.12.6 | ||
| Apple | N/A | iTunes pour Windows versions antérieures à 12.6.2 | ||
| Apple | N/A | El Capitan sans le correctif de sécurité 2017-003 | ||
| Apple | N/A | tvOS versions antérieures à 10.2.2 | ||
| Apple | N/A | iOS versions antérieures à 10.3.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Yosemite sans le correctif de s\u00e9curit\u00e9 2017-003",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra verions ant\u00e9rieures \u00e0 10.12.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes pour Windows versions ant\u00e9rieures \u00e0 12.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "El Capitan sans le correctif de s\u00e9curit\u00e9 2017-003",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-7016",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7016"
},
{
"name": "CVE-2017-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7008"
},
{
"name": "CVE-2017-7037",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7037"
},
{
"name": "CVE-2017-7017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7017"
},
{
"name": "CVE-2017-7011",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7011"
},
{
"name": "CVE-2017-7023",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7023"
},
{
"name": "CVE-2017-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7056"
},
{
"name": "CVE-2017-2517",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2517"
},
{
"name": "CVE-2017-7029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7029"
},
{
"name": "CVE-2017-7054",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7054"
},
{
"name": "CVE-2017-7025",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7025"
},
{
"name": "CVE-2017-7021",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7021"
},
{
"name": "CVE-2017-7047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7047"
},
{
"name": "CVE-2017-7041",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7041"
},
{
"name": "CVE-2017-7069",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7069"
},
{
"name": "CVE-2017-7064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7064"
},
{
"name": "CVE-2016-9594",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9594"
},
{
"name": "CVE-2017-7067",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7067"
},
{
"name": "CVE-2017-7045",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7045"
},
{
"name": "CVE-2017-7015",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7015"
},
{
"name": "CVE-2017-7048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7048"
},
{
"name": "CVE-2017-8248",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8248"
},
{
"name": "CVE-2017-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7039"
},
{
"name": "CVE-2017-7043",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7043"
},
{
"name": "CVE-2017-7059",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7059"
},
{
"name": "CVE-2017-7024",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7024"
},
{
"name": "CVE-2017-9417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9417"
},
{
"name": "CVE-2017-7060",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7060"
},
{
"name": "CVE-2017-7031",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7031"
},
{
"name": "CVE-2017-7036",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7036"
},
{
"name": "CVE-2017-7050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7050"
},
{
"name": "CVE-2017-7044",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7044"
},
{
"name": "CVE-2017-7068",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7068"
},
{
"name": "CVE-2017-7061",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7061"
},
{
"name": "CVE-2017-7468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7468"
},
{
"name": "CVE-2017-2629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2629"
},
{
"name": "CVE-2017-7063",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7063"
},
{
"name": "CVE-2017-7026",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7026"
},
{
"name": "CVE-2017-7058",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7058"
},
{
"name": "CVE-2017-7009",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7009"
},
{
"name": "CVE-2017-7010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7010"
},
{
"name": "CVE-2017-7055",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7055"
},
{
"name": "CVE-2017-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7042"
},
{
"name": "CVE-2017-7040",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7040"
},
{
"name": "CVE-2017-7053",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7053"
},
{
"name": "CVE-2017-7038",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7038"
},
{
"name": "CVE-2017-7020",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7020"
},
{
"name": "CVE-2017-7019",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7019"
},
{
"name": "CVE-2017-7027",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7027"
},
{
"name": "CVE-2017-7052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7052"
},
{
"name": "CVE-2017-7046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7046"
},
{
"name": "CVE-2017-7007",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7007"
},
{
"name": "CVE-2017-7062",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7062"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7012"
},
{
"name": "CVE-2017-7018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7018"
},
{
"name": "CVE-2017-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7006"
},
{
"name": "CVE-2017-7014",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7014"
},
{
"name": "CVE-2017-7049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7049"
},
{
"name": "CVE-2017-7051",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7051"
},
{
"name": "CVE-2017-7034",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7034"
},
{
"name": "CVE-2017-7013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7013"
},
{
"name": "CVE-2017-7022",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7022"
},
{
"name": "CVE-2017-7030",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7030"
},
{
"name": "CVE-2017-7028",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7028"
},
{
"name": "CVE-2017-7033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7033"
},
{
"name": "CVE-2017-7032",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7032"
},
{
"name": "CVE-2017-7035",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7035"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-229",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-07-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207923 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207923"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207927 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT20797"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207925 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207925"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207924 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207924"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207928 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT20798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207922 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207922"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207921 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207921"
}
]
}
CERTFR-2017-AVI-229
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions antérieures à 3.2.3 | ||
| Apple | N/A | Yosemite sans le correctif de sécurité 2017-003 | ||
| Apple | N/A | iCloud pour Windows versions antérieures à 6.2.2 | ||
| Apple | Safari | Safari versions antérieures à 10.1.2 | ||
| Apple | macOS | macOS Sierra verions antérieures à 10.12.6 | ||
| Apple | N/A | iTunes pour Windows versions antérieures à 12.6.2 | ||
| Apple | N/A | El Capitan sans le correctif de sécurité 2017-003 | ||
| Apple | N/A | tvOS versions antérieures à 10.2.2 | ||
| Apple | N/A | iOS versions antérieures à 10.3.3 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions ant\u00e9rieures \u00e0 3.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Yosemite sans le correctif de s\u00e9curit\u00e9 2017-003",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iCloud pour Windows versions ant\u00e9rieures \u00e0 6.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sierra verions ant\u00e9rieures \u00e0 10.12.6",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iTunes pour Windows versions ant\u00e9rieures \u00e0 12.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "El Capitan sans le correctif de s\u00e9curit\u00e9 2017-003",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 10.3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-7016",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7016"
},
{
"name": "CVE-2017-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7008"
},
{
"name": "CVE-2017-7037",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7037"
},
{
"name": "CVE-2017-7017",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7017"
},
{
"name": "CVE-2017-7011",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7011"
},
{
"name": "CVE-2017-7023",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7023"
},
{
"name": "CVE-2017-7056",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7056"
},
{
"name": "CVE-2017-2517",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2517"
},
{
"name": "CVE-2017-7029",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7029"
},
{
"name": "CVE-2017-7054",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7054"
},
{
"name": "CVE-2017-7025",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7025"
},
{
"name": "CVE-2017-7021",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7021"
},
{
"name": "CVE-2017-7047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7047"
},
{
"name": "CVE-2017-7041",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7041"
},
{
"name": "CVE-2017-7069",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7069"
},
{
"name": "CVE-2017-7064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7064"
},
{
"name": "CVE-2016-9594",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9594"
},
{
"name": "CVE-2017-7067",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7067"
},
{
"name": "CVE-2017-7045",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7045"
},
{
"name": "CVE-2017-7015",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7015"
},
{
"name": "CVE-2017-7048",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7048"
},
{
"name": "CVE-2017-8248",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8248"
},
{
"name": "CVE-2017-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7039"
},
{
"name": "CVE-2017-7043",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7043"
},
{
"name": "CVE-2017-7059",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7059"
},
{
"name": "CVE-2017-7024",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7024"
},
{
"name": "CVE-2017-9417",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9417"
},
{
"name": "CVE-2017-7060",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7060"
},
{
"name": "CVE-2017-7031",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7031"
},
{
"name": "CVE-2017-7036",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7036"
},
{
"name": "CVE-2017-7050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7050"
},
{
"name": "CVE-2017-7044",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7044"
},
{
"name": "CVE-2017-7068",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7068"
},
{
"name": "CVE-2017-7061",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7061"
},
{
"name": "CVE-2017-7468",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7468"
},
{
"name": "CVE-2017-2629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2629"
},
{
"name": "CVE-2017-7063",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7063"
},
{
"name": "CVE-2017-7026",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7026"
},
{
"name": "CVE-2017-7058",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7058"
},
{
"name": "CVE-2017-7009",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7009"
},
{
"name": "CVE-2017-7010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7010"
},
{
"name": "CVE-2017-7055",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7055"
},
{
"name": "CVE-2017-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7042"
},
{
"name": "CVE-2017-7040",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7040"
},
{
"name": "CVE-2017-7053",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7053"
},
{
"name": "CVE-2017-7038",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7038"
},
{
"name": "CVE-2017-7020",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7020"
},
{
"name": "CVE-2017-7019",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7019"
},
{
"name": "CVE-2017-7027",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7027"
},
{
"name": "CVE-2017-7052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7052"
},
{
"name": "CVE-2017-7046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7046"
},
{
"name": "CVE-2017-7007",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7007"
},
{
"name": "CVE-2017-7062",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7062"
},
{
"name": "CVE-2016-9586",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9586"
},
{
"name": "CVE-2017-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7012"
},
{
"name": "CVE-2017-7018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7018"
},
{
"name": "CVE-2017-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7006"
},
{
"name": "CVE-2017-7014",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7014"
},
{
"name": "CVE-2017-7049",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7049"
},
{
"name": "CVE-2017-7051",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7051"
},
{
"name": "CVE-2017-7034",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7034"
},
{
"name": "CVE-2017-7013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7013"
},
{
"name": "CVE-2017-7022",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7022"
},
{
"name": "CVE-2017-7030",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7030"
},
{
"name": "CVE-2017-7028",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7028"
},
{
"name": "CVE-2017-7033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7033"
},
{
"name": "CVE-2017-7032",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7032"
},
{
"name": "CVE-2017-7035",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7035"
}
],
"links": [],
"reference": "CERTFR-2017-AVI-229",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2017-07-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Apple\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une ex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207923 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207923"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207927 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT20797"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207925 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207925"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207924 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207924"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207928 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT20798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207922 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207922"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT207921 du 19 juillet 2017",
"url": "https://support.apple.com/en-us/HT207921"
}
]
}
FKIE_CVE-2017-7053
Vulnerability from fkie_nvd - Published: 2017-07-20 16:29 - Updated: 2025-04-20 01:37| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | http://www.securityfocus.com/bid/99884 | Third Party Advisory, VDB Entry | |
| product-security@apple.com | https://support.apple.com/HT207928 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/99884 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/HT207928 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B5211EFA-1504-463B-AC5C-35EA9DD5B152",
"versionEndIncluding": "12.6.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \"iTunes\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app."
},
{
"lang": "es",
"value": "Fue detectado un problema en ciertos productos de Apple. iTunes versi\u00f3n anterior a 12.6.2 en Windows se ve afectado. El tema involucra el componente \"iTunes\". Permite a los atacantes ejecutar un c\u00f3digo arbitrario en un contexto privilegiado por medio de una aplicaci\u00f3n creada."
}
],
"id": "CVE-2017-7053",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-07-20T16:29:02.113",
"references": [
{
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99884"
},
{
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207928"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99884"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207928"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
VAR-201707-1156
Vulnerability from variot - Updated: 2023-12-18 11:26An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the "iTunes" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple iTunes. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of the iPodManager COM control. The issue results from the lack of proper restriction of access to the control. Apple iTunes is prone to an arbitrary code-execution vulnerability. Failed exploit attempts will likely result in denial-of-service conditions. Versions prior to iTunes 12.6.2 are vulnerable. Apple iTunes for Windows is a set of media player applications based on the Windows platform of Apple (Apple), which is mainly used for playing and managing digital music and video files. CVE-2017-7053: an anonymous researcher working with Trend Micro's Zero Day Initiative
libxml2 Available for: Windows 7 and later Impact: Parsing a maliciously crafted XML document may lead to disclosure of user information Description: An out-of-bounds read was addressed through improved bounds checking. CVE-2017-7010: Apple CVE-2017-7013: found by OSS-Fuzz
WebKit Available for: Windows 7 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2017-7018: lokihardt of Google Project Zero CVE-2017-7020: likemeng of Baidu Security Lab CVE-2017-7030: chenqin of Ant-financial Light-Year Security Lab (eeeaea'ae-aa1'a(r)a"a(r)eaa(r)$?) CVE-2017-7034: chenqin of Ant-financial Light-Year Security Lab (eeeaea'ae-aa1'a(r)a"a(r)eaa(r)$?) CVE-2017-7037: lokihardt of Google Project Zero CVE-2017-7039: Ivan Fratric of Google Project Zero CVE-2017-7040: Ivan Fratric of Google Project Zero CVE-2017-7041: Ivan Fratric of Google Project Zero CVE-2017-7042: Ivan Fratric of Google Project Zero CVE-2017-7043: Ivan Fratric of Google Project Zero CVE-2017-7046: Ivan Fratric of Google Project Zero CVE-2017-7048: Ivan Fratric of Google Project Zero CVE-2017-7052: cc working with Trend Micro's Zero Day Initiative CVE-2017-7055: The UK's National Cyber Security Centre (NCSC) CVE-2017-7056: lokihardt of Google Project Zero CVE-2017-7061: lokihardt of Google Project Zero
WebKit Available for: Windows 7 and later Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed through improved memory handling. CVE-2017-7064: lokihardt of Google Project Zero
WebKit Available for: Windows 7 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed through improved memory handling. CVE-2017-7049: Ivan Fratric of Google Project Zero
WebKit Page Loading Available for: Windows 7 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2017-7019: Zhiyang Zeng of Tencent Security Platform Department
WebKit Web Inspector Available for: Windows 7 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2017-7012: Apple
Installation note:
iTunes 12.6.2 may be obtained from: https://www.apple.com/itunes/download/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJZb5VTAAoJEIOj74w0bLRGEccP/jVIFy9gzYin6CI8rIeCmWt9 kUEF+pq1YA/g+kk9taYr2OiQfqeErVDjBXpq8VwdJVtmEqAtm1vJo1KbPjYqZjGz eh9vFFgcREmm6FVGLxvI895bCjvcxqkXNXGdAYntrWV4w1zX+Is3QknK96nJ416O CYUbf92GfEPPAtEGTQQ8CTpnGfnicTluTi2qU4xi1h7SQ5JHpNEfduulVX8CBbHQ CHDnDyfXnvYmEH5IqkDaWWPgjaMJ1S/F9SCYzWgR0Skw4iXPYeIgS+Vpb61rLykK vh+KVffaS/d73QGwsWzGqq+EcPzxLGrB8/jU9VBNw5wiQysOsA3N67R2aU5blha5 MriGAOklig75+p6k6odo5hL2eUdsj/2g1zsYDKRK6hMvUpjU1boqCCY+qhRwPj6e V1BWaDB5uwEaT9dY5yFYW6W8TPoJBYZRECPDRxyGcjCyDw5RQqC24lIiEF+wbjwo loRGCo5PAcHafdRwmLtiCs71UQdywNg81giB4IbLW9HoRciMlySq1MCbfj/RSXMK VYjmIuMAJektSOYPygNQ6HN2R5odYoQNix3njXyFz9dL3xg72QtrX6sALzhdSTcu EUTHLyqQm3b3hv3qUG+q96WYtFnZe/0F2eGuquu0m1rW9wIJmLcvHRw50Wd2UJCR 0roqHiwf3axwmFEhNiWC =8+yO -----END PGP SIGNATURE-----
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201707-1156",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "itunes",
"scope": "lte",
"trust": 1.0,
"vendor": "apple",
"version": "12.6.1"
},
{
"model": "itunes",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "for windows 12.6.2 (windows 7 or later )"
},
{
"model": "itunes",
"scope": null,
"trust": 0.7,
"vendor": "apple",
"version": null
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "12.6.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.5.5"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.5.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.4.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.3.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.3.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.2.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.1.5"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.1.4"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.1.3"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.1.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.1.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.0.5"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.0.4"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.0.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.6.3"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.6.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.5.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.1.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4.5"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.6"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.5.4"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.5.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.4"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.3"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "12.0.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.0.3"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.0.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.0.0.163"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "11.0"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.7"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.6.1.7"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.6"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.5.3"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.5.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.5.1.42"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.5"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.4.1.10"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.4.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.4.0.80"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.4"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.3.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.3"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.2.2.12"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.2.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.2"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.1.1.4"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.1.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10.0.1"
},
{
"model": "itunes",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "10"
},
{
"model": "itunes",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "12.6.2"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"db": "BID",
"id": "99884"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"db": "NVD",
"id": "CVE-2017-7053"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.6.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7053"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Anonymous",
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"db": "BID",
"id": "99884"
}
],
"trust": 1.0
},
"cve": "CVE-2017-7053",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2017-7053",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "ZDI",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2017-7053",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.7,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-115256",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2017-7053",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-7053",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "ZDI",
"id": "CVE-2017-7053",
"trust": 0.7,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201707-957",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-115256",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"db": "VULHUB",
"id": "VHN-115256"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"db": "NVD",
"id": "CVE-2017-7053"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \"iTunes\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app. This vulnerability allows local attackers to escalate privileges on vulnerable installations of Apple iTunes. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of the iPodManager COM control. The issue results from the lack of proper restriction of access to the control. Apple iTunes is prone to an arbitrary code-execution vulnerability. Failed exploit attempts will likely result in denial-of-service conditions. \nVersions prior to iTunes 12.6.2 are vulnerable. Apple iTunes for Windows is a set of media player applications based on the Windows platform of Apple (Apple), which is mainly used for playing and managing digital music and video files. \nCVE-2017-7053: an anonymous researcher working with Trend Micro\u0027s\nZero Day Initiative\n\nlibxml2\nAvailable for: Windows 7 and later\nImpact: Parsing a maliciously crafted XML document may lead to\ndisclosure of user information\nDescription: An out-of-bounds read was addressed through improved\nbounds checking. \nCVE-2017-7010: Apple\nCVE-2017-7013: found by OSS-Fuzz\n\nWebKit\nAvailable for: Windows 7 and later\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. \nCVE-2017-7018: lokihardt of Google Project Zero\nCVE-2017-7020: likemeng of Baidu Security Lab\nCVE-2017-7030: chenqin of Ant-financial Light-Year Security Lab\n(eeeaea*\u0027ae-aa1\u0027a(r)a\"a(r)eaa(r)$?)\nCVE-2017-7034: chenqin of Ant-financial Light-Year Security Lab\n(eeeaea*\u0027ae-aa1\u0027a(r)a\"a(r)eaa(r)$?)\nCVE-2017-7037: lokihardt of Google Project Zero\nCVE-2017-7039: Ivan Fratric of Google Project Zero\nCVE-2017-7040: Ivan Fratric of Google Project Zero\nCVE-2017-7041: Ivan Fratric of Google Project Zero\nCVE-2017-7042: Ivan Fratric of Google Project Zero\nCVE-2017-7043: Ivan Fratric of Google Project Zero\nCVE-2017-7046: Ivan Fratric of Google Project Zero\nCVE-2017-7048: Ivan Fratric of Google Project Zero\nCVE-2017-7052: cc working with Trend Micro\u0027s Zero Day Initiative\nCVE-2017-7055: The UK\u0027s National Cyber Security Centre (NCSC)\nCVE-2017-7056: lokihardt of Google Project Zero\nCVE-2017-7061: lokihardt of Google Project Zero\n\nWebKit\nAvailable for: Windows 7 and later\nImpact: An application may be able to read restricted memory\nDescription: A memory initialization issue was addressed through\nimproved memory handling. \nCVE-2017-7064: lokihardt of Google Project Zero\n\nWebKit\nAvailable for: Windows 7 and later\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed through\nimproved memory handling. \nCVE-2017-7049: Ivan Fratric of Google Project Zero\n\nWebKit Page Loading\nAvailable for: Windows 7 and later\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. \nCVE-2017-7019: Zhiyang Zeng of Tencent Security Platform Department\n\nWebKit Web Inspector\nAvailable for: Windows 7 and later\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. \nCVE-2017-7012: Apple\n\nInstallation note:\n\niTunes 12.6.2 may be obtained from:\nhttps://www.apple.com/itunes/download/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\nComment: GPGTools - https://gpgtools.org\n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\n0roqHiwf3axwmFEhNiWC\n=8+yO\n-----END PGP SIGNATURE-----\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7053"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"db": "BID",
"id": "99884"
},
{
"db": "VULHUB",
"id": "VHN-115256"
},
{
"db": "PACKETSTORM",
"id": "143439"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-7053",
"trust": 3.6
},
{
"db": "BID",
"id": "99884",
"trust": 2.0
},
{
"db": "JVN",
"id": "JVNVU91410779",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005715",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-4798",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-17-490",
"trust": 0.7
},
{
"db": "CNNVD",
"id": "CNNVD-201707-957",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-115256",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "143439",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"db": "VULHUB",
"id": "VHN-115256"
},
{
"db": "BID",
"id": "99884"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"db": "PACKETSTORM",
"id": "143439"
},
{
"db": "NVD",
"id": "CVE-2017-7053"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
]
},
"id": "VAR-201707-1156",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-115256"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T11:26:42.763000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Apple security updates",
"trust": 0.8,
"url": "https://support.apple.com/en-us/ht201222"
},
{
"title": "HT207928",
"trust": 0.8,
"url": "https://support.apple.com/en-us/ht207928"
},
{
"title": "HT207928",
"trust": 0.8,
"url": "https://support.apple.com/ja-jp/ht207928"
},
{
"title": "Apple has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://support.apple.com/kb/ht201222"
},
{
"title": "Apple iTunes for Windows iTunes Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=71899"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-284",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-115256"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"db": "NVD",
"id": "CVE-2017-7053"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/99884"
},
{
"trust": 1.7,
"url": "https://support.apple.com/ht207928"
},
{
"trust": 0.9,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7053"
},
{
"trust": 0.8,
"url": "https://support.apple.com/kb/ht201222"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7053"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu91410779/index.html"
},
{
"trust": 0.3,
"url": "https://www.apple.com/"
},
{
"trust": 0.3,
"url": "https://support.apple.com/de-de/ht207928"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7056"
},
{
"trust": 0.1,
"url": "https://gpgtools.org"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7020"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7061"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7046"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7039"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7055"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7064"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7052"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7042"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7041"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7049"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7030"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7019"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7037"
},
{
"trust": 0.1,
"url": "https://www.apple.com/support/security/pgp/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7010"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7034"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7018"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7048"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7043"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7012"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7013"
},
{
"trust": 0.1,
"url": "https://www.apple.com/itunes/download/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7040"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"db": "VULHUB",
"id": "VHN-115256"
},
{
"db": "BID",
"id": "99884"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"db": "PACKETSTORM",
"id": "143439"
},
{
"db": "NVD",
"id": "CVE-2017-7053"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"db": "VULHUB",
"id": "VHN-115256"
},
{
"db": "BID",
"id": "99884"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"db": "PACKETSTORM",
"id": "143439"
},
{
"db": "NVD",
"id": "CVE-2017-7053"
},
{
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-19T00:00:00",
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"date": "2017-07-20T00:00:00",
"db": "VULHUB",
"id": "VHN-115256"
},
{
"date": "2017-07-20T00:00:00",
"db": "BID",
"id": "99884"
},
{
"date": "2017-08-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"date": "2017-07-21T04:44:44",
"db": "PACKETSTORM",
"id": "143439"
},
{
"date": "2017-07-20T16:29:02.113000",
"db": "NVD",
"id": "CVE-2017-7053"
},
{
"date": "2017-07-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-19T00:00:00",
"db": "ZDI",
"id": "ZDI-17-490"
},
{
"date": "2019-10-03T00:00:00",
"db": "VULHUB",
"id": "VHN-115256"
},
{
"date": "2017-07-20T00:00:00",
"db": "BID",
"id": "99884"
},
{
"date": "2017-08-04T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-005715"
},
{
"date": "2019-10-03T00:03:26.223000",
"db": "NVD",
"id": "CVE-2017-7053"
},
{
"date": "2019-10-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Windows for Apple iTunes of iTunes Component vulnerable to arbitrary code execution in privileged context",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-005715"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access control error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201707-957"
}
],
"trust": 0.6
}
}
GSD-2017-7053
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2017-7053",
"description": "An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \"iTunes\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.",
"id": "GSD-2017-7053"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-7053"
],
"details": "An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \"iTunes\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.",
"id": "GSD-2017-7053",
"modified": "2023-12-13T01:21:07.033924Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2017-7053",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \"iTunes\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT207928",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT207928"
},
{
"name": "99884",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99884"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "12.6.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2017-7053"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \"iTunes\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/HT207928",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/HT207928"
},
{
"name": "99884",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/99884"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-03T00:03Z",
"publishedDate": "2017-07-20T16:29Z"
}
}
}
GHSA-6JMJ-9XM4-G77V
Vulnerability from github – Published: 2022-05-13 01:46 – Updated: 2022-05-13 01:46An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the "iTunes" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.
{
"affected": [],
"aliases": [
"CVE-2017-7053"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-07-20T16:29:00Z",
"severity": "HIGH"
},
"details": "An issue was discovered in certain Apple products. iTunes before 12.6.2 on Windows is affected. The issue involves the \"iTunes\" component. It allows attackers to execute arbitrary code in a privileged context via a crafted app.",
"id": "GHSA-6jmj-9xm4-g77v",
"modified": "2022-05-13T01:46:50Z",
"published": "2022-05-13T01:46:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7053"
},
{
"type": "WEB",
"url": "https://support.apple.com/HT207928"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/99884"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.