First published: Tue Sep 19 2017(Updated: )
Kernel. A validation issue was addressed with improved input sanitization.
Credit: The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich an anonymous researcher Kevin Backhouse Semmle Ltd product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <11 | 11 |
macOS High Sierra | <10.13 | 10.13 |
macOS High Sierra | <10.13.1 | 10.13.1 |
macOS High Sierra | ||
Apple El Capitan | ||
Apple iOS, iPadOS, and watchOS | <11 | 11 |
Apple iOS, iPadOS, and watchOS | <4 | 4 |
Apple iOS and macOS | <=10.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2017-13841.
The severity rating of CVE-2017-13841 is medium.
macOS before 10.13.1, macOS High Sierra before 10.13.1, watchOS before 4, Apple Sierra, Apple El Capitan, iOS before 11, and tvOS before 11 are affected by CVE-2017-13841.
An attacker can exploit CVE-2017-13841 by bypassing intended memory-read restrictions via a crafted app.
You can find more information about CVE-2017-13841 on the Apple support website at the following links: [Link 1](https://support.apple.com/en-us/HT208115), [Link 2](https://support.apple.com/en-us/HT208221), [Link 3](https://support.apple.com/en-us/HT208113).