First published: Tue Sep 19 2017(Updated: )
Kernel. A validation issue was addressed with improved input sanitization.
Credit: The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich an anonymous researcher The UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle LtdThe UK's National Cyber Security Centre (NCSC) Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Vlad Tsyrklevich Kevin Backhouse Semmle Ltd product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <=10.13.0 | |
Apple watchOS | <4 | 4 |
Apple tvOS | <11 | 11 |
Apple iOS | <11 | 11 |
Apple macOS | <10.13 | 10.13 |
Apple macOS | <10.13.1 | 10.13.1 |
Apple Sierra | ||
Apple El Capitan |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2017-13842.
The severity of CVE-2017-13842 is medium (5.5).
macOS before 10.13.1, watchOS up to version 4, tvOS up to version 11, and iOS up to version 11 are affected by CVE-2017-13842.
CVE-2017-13842 can be exploited by attackers to bypass intended memory-read restrictions via a crafted app.
Yes, Apple has released updates to address the vulnerability. Please refer to the official Apple support page for more information.