First published: Tue Sep 19 2017(Updated: )
Kernel. A validation issue was addressed with improved input sanitization.
Credit: The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle LtdThe UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle Ltd product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <=10.13.0 | |
Apple macOS High Sierra | <10.13.1 | 10.13.1 |
Apple Sierra | ||
Apple El Capitan | ||
Apple iOS | <11 | 11 |
Apple tvOS | <11 | 11 |
Apple watchOS | <4 | 4 |
Apple macOS High Sierra | <10.13 | 10.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2017-13836.
CVE-2017-13836 has a severity rating of medium (5.5).
macOS High Sierra versions 10.13.0 and 10.13.1, Sierra, El Capitan, tvOS 11, iOS 11, and watchOS 4 are affected by CVE-2017-13836.
An attacker can exploit CVE-2017-13836 by bypassing intended memory-read restrictions through a crafted app.
Yes, Apple has released security updates to address the CVE-2017-13836 vulnerability.