First published: Tue Sep 19 2017(Updated: )
Kernel. A validation issue was addressed with improved input sanitization.
Credit: The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle LtdThe UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle Ltd product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <=10.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-13840 is a validation issue in the Kernel component of certain Apple products, allowing attackers to bypass memory-read restrictions via a crafted app.
macOS before 10.13.1, watchOS 4, Apple Sierra, Apple El Capitan, tvOS before 11, and iOS before 11 are affected.
The severity of CVE-2017-13840 is medium with a CVSS score of 5.5.
Upgrade to macOS 10.13.1 or later, watchOS 4 or later, update to the latest version of tvOS, iOS 11 or later, or apply the necessary patches from Apple.
You can find more information about CVE-2017-13840 on the Apple support website.