First published: Tue Sep 19 2017(Updated: )
Kernel. A validation issue was addressed with improved input sanitization.
Credit: The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle LtdThe UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle Ltd product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <=10.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2017-13841.
The severity rating of CVE-2017-13841 is medium.
macOS before 10.13.1, macOS High Sierra before 10.13.1, watchOS before 4, Apple Sierra, Apple El Capitan, iOS before 11, and tvOS before 11 are affected by CVE-2017-13841.
An attacker can exploit CVE-2017-13841 by bypassing intended memory-read restrictions via a crafted app.
You can find more information about CVE-2017-13841 on the Apple support website at the following links: [Link 1](https://support.apple.com/en-us/HT208115), [Link 2](https://support.apple.com/en-us/HT208221), [Link 3](https://support.apple.com/en-us/HT208113).