First published: Sat Dec 02 2017(Updated: )
An issue was discovered in certain Apple products. iOS before 11.2 is affected. macOS before 10.13.2 is affected. tvOS before 11.2 is affected. watchOS before 4.2 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
Credit: Ian Beer Google Project ZeroBrandon Azad Jann Horn Google Project ZeroIan Beer Google Project ZeroBrandon Azad Jann Horn Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project ZeroBrandon Azad Jann Horn Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <11.2 | |
Apple Mac OS X | <10.13.2 | |
Apple tvOS | <11.2 | |
Apple watchOS | <4.2 | |
Apple iOS | <11.2 | 11.2 |
Apple macOS High Sierra | <10.13.2 | 10.13.2 |
Apple Sierra | ||
Apple El Capitan | ||
Apple watchOS | <4.2 | 4.2 |
Apple tvOS | <11.2 | 11.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2017-13865 is medium with a severity value of 5.5.
iOS before 11.2, macOS before 10.13.2, tvOS before 11.2, and watchOS before 4.2 are affected by CVE-2017-13865.
CVE-2017-13865 is a validation issue that was addressed with improved input sanitization.
Attackers can exploit CVE-2017-13865 to bypass intended memory-read restrictions via a crafted app.
Yes, the remedy for CVE-2017-13865 is to update to the specified versions of the affected software.