First published: Tue Sep 19 2017(Updated: )
An issue was discovered in certain Apple products. macOS before 10.13.1 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a /dev/dtracehelper attack involving the dtrace_dif_variable and dtrace_getarg functions.
Credit: The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich an anonymous researcher Kevin Backhouse Semmle Ltd product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <11 | 11 |
macOS High Sierra | <10.13 | 10.13 |
macOS High Sierra | <10.13.1 | 10.13.1 |
macOS High Sierra | ||
Apple El Capitan | ||
Apple iOS, iPadOS, and watchOS | <4 | 4 |
Apple iOS and macOS | <=10.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-13782 is a vulnerability found in certain Apple products, including macOS before 10.13.1.
CVE-2017-13782 has a severity value of 5.5, which is considered medium.
CVE-2017-13782 can be exploited by attackers to bypass intended memory-read restrictions through a /dev/dtracehelper attack involving the dtrace_dif_variable and dtrace_getarg functions.
macOS before 10.13.1, macOS High Sierra before 10.13, watchOS before 4, tvOS before 11, and Apple Sierra and El Capitan are affected by CVE-2017-13782.
To fix CVE-2017-13782, update to macOS 10.13.1 or later, or apply the recommended security updates for the affected products.