First published: Sat Dec 02 2017(Updated: )
CFNetwork Session. A memory corruption issue was addressed with improved memory handling.
Credit: Richard Zhu (fluorescence) Trend MicroRichard Zhu (fluorescence) Trend MicroRichard Zhu (fluorescence) Trend MicroRichard Zhu (fluorescence) Trend MicroRichard Zhu (fluorescence) Trend Micro product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <11.2 | 11.2 |
macOS High Sierra | <10.13.2 | 10.13.2 |
macOS High Sierra | ||
Apple El Capitan | ||
Apple iOS, iPadOS, and watchOS | <4.2 | 4.2 |
iTunes | <12.7.2 | 12.7.2 |
Apple iOS and iPadOS | <11.2 | 11.2 |
iPhone OS | <11.2 | |
Apple iOS and macOS | <10.13.2 | |
tvOS | <11.2 | |
Apple iOS, iPadOS, and watchOS | <4.2 | |
iCloud | <7.2 | |
Microsoft Windows Operating System | ||
iTunes | <12.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7172 is a vulnerability that affects certain Apple products including iOS, macOS, iCloud, iTunes, tvOS, and watchOS.
CVE-2017-7172 has a severity rating of 7.8, which is classified as critical.
iOS before 11.2, macOS before 10.13.2, iCloud before 7.2 on Windows, iTunes before 12.7.2 on Windows, tvOS before 11.2, and watchOS before 4.2 are affected by CVE-2017-7172.
To fix CVE-2017-7172, update your Apple devices to the latest available version of iOS, macOS, iCloud, iTunes, tvOS, or watchOS.
You can find more information about CVE-2017-7172 on the official Apple support website. Here are some references: [link1](https://support.apple.com/HT208325), [link2](https://support.apple.com/HT208326), [link3](https://support.apple.com/HT208327).