First published: Tue Sep 19 2017(Updated: )
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a /dev/dtracehelper attack involving the dtrace_dif_variable and dtrace_getarg functions.
Credit: The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle LtdThe UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle Ltd product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS High Sierra | <10.13.1 | 10.13.1 |
Apple Sierra | ||
Apple El Capitan | ||
Apple Mac OS X | <=10.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-13782 is a vulnerability found in certain Apple products, including macOS before 10.13.1.
CVE-2017-13782 has a severity value of 5.5, which is considered medium.
CVE-2017-13782 can be exploited by attackers to bypass intended memory-read restrictions through a /dev/dtracehelper attack involving the dtrace_dif_variable and dtrace_getarg functions.
macOS before 10.13.1, macOS High Sierra before 10.13, watchOS before 4, tvOS before 11, and Apple Sierra and El Capitan are affected by CVE-2017-13782.
To fix CVE-2017-13782, update to macOS 10.13.1 or later, or apply the recommended security updates for the affected products.