First published: Sat Dec 02 2017(Updated: )
CoreFoundation. A race condition was addressed with additional validation.
Credit: Samuel Groß @5aelo Samuel Groß @5aelo Samuel Groß @5aelo Samuel Groß @5aelo Samuel Groß @5aelo Samuel Groß @5aelo product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <4.2 | 4.2 |
Apple iTunes for Windows | <12.7.2 | 12.7.2 |
Apple tvOS | <11.2 | 11.2 |
Apple macOS High Sierra | <10.13.2 | 10.13.2 |
Apple Sierra | ||
Apple El Capitan | ||
Apple iOS | <11.2 | 11.2 |
Apple macOS High Sierra | <10.13.4 | 10.13.4 |
Apple iPhone OS | <11.2 | |
Apple Mac OS X | <10.13.2 | |
Apple Mac OS X | >=10.13.3<10.13.4 | |
Apple tvOS | <11.2 | |
Apple watchOS | <4.2 | |
Apple iTunes | <12.7.2 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2017-7151 is a vulnerability related to a race condition that was addressed with additional validation.
Versions prior to iOS 11.2, macOS High Sierra 10.13.2, tvOS 11.2, watchOS 4.2, and iTunes 12.7.2 for Windows are affected by CVE-2017-7151.
CVE-2017-7151 has a severity level of high (7).
To fix CVE-2017-7151, update your software to iOS 11.2 or later, macOS High Sierra 10.13.2 or later, tvOS 11.2 or later, watchOS 4.2 or later, or iTunes 12.7.2 for Windows.
Yes, you can find more information about CVE-2017-7151 at the following references: [link1](https://support.apple.com/kb/HT208325), [link2](https://support.apple.com/kb/HT208326), [link3](https://support.apple.com/kb/HT208327).