SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   OS (UNIX)  >   Apple macOS/OS X Vendors:   Apple
Apple macOS/OS X Multiple Flaws Let Remote Users Obtain Potentially Sensitive Information and Let Local Users Deny Service, View Files, and Gain Elevated Privileges
SecurityTracker Alert ID:  1039966
SecurityTracker URL:  http://securitytracker.com/id/1039966
CVE Reference:   CVE-2017-13826, CVE-2017-13833, CVE-2017-13847, CVE-2017-13848, CVE-2017-13855, CVE-2017-13858, CVE-2017-13860, CVE-2017-13862, CVE-2017-13865, CVE-2017-13867, CVE-2017-13868, CVE-2017-13869, CVE-2017-13871, CVE-2017-13875, CVE-2017-13876, CVE-2017-13878, CVE-2017-13883   (Links to External Site)
Updated:  Dec 6 2017
Original Entry Date:  Dec 6 2017
Impact:   Denial of service via local system, Disclosure of system information, Disclosure of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Apple macOS/OS X. An application can cause denial of service conditions on the target system. An application can obtain potentially sensitive information from system memory. An application user can obtain elevated privileges on the target system. A remote authenticated user can obtain files on the target system. A remote user can obtain potentially sensitive information on the target system.

An application can trigger a memory corruption error in the Intel Graphics Driver component to execute arbitrary code with kernel privileges [CVE-2017-13883].

A local user can trigger an out-of-bounds memory read error in the Intel Graphics Driver component to view kernel memory contents or cause the system to crash [CVE-2017-13878].

An application can trigger an out-of-bounds memory read error in the Intel Graphics Driver component to execute arbitrary code with system privileges [CVE-2017-13875].

An application can trigger an input validation flaw in the IOKit component to execute arbitrary code with system privileges [CVE-2017-13848, CVE-2017-13858].

An application can trigger a memory corruption error in the IOKit component to execute arbitrary code with system privileges [CVE-2017-13847].

An application can trigger a memory corruption error in the the kernel component to execute arbitrary code with kernel privileges [CVE-2017-13862].

An application can trigger an out-of-bounds memory read error in the the kernel component to read restricted memory [CVE-2017-13833].

An application can trigger a memory corruption error in the the kernel component to execute arbitrary code with kernel privileges [CVE-2017-13876].

An application can trigger a memory handling error in the the kernel component to read restricted memory [CVE-2017-13855].

An application can trigger a memory corruption error in the the kernel component to execute arbitrary code with kernel privileges [CVE-2017-13867].

An application can trigger a input validation flaw in the the kernel component to read restricted memory [CVE-2017-13865].

An application can trigger a input validation flaw in the the kernel component to read restricted memory [CVE-2017-13868, CVE-2017-13869].

The system may send an email in unencrypted form that should be sent with S/MIME encryption if the recipient's S/MIME certificate is not installed on the system [CVE-2017-13871].

A remote user in a privileged network position can exploit an encryption error with S/MIME credentials in the Mail Drafts component to intercept mail [CVE-2017-13860].

A remote authenticated user with screen sharing access can trigger a permissions error in the Screen Sharing Server component to read files with root privileges [CVE-2017-13826].

Alex Plaskett of MWR InfoSecurity, Brandon Azad, Ian Beer of Google Project Zero, Jann Horn of Google Project Zero, Michael Weishaar of INNEO Solutions GmbH, Trevor Jacques of Toronto, an anonymous researcher, and OSS-Fuzz reported these vulnerabilities.

Impact:   A local user can cause denial of service conditions on the target system.

A local user can obtain potentially sensitive information from system memory on the target system.

A local user can obtain elevated privileges on the target system.

A remote authenticated user can obtain files on the target system.

A remote user can obtain potentially sensitive information on the target system.

Solution:   The vendor has issued a fix (macOS High Sierra 10.13.2, Security Update 2017-002 Sierra, Security Update 2017-005 El Capitan).

The vendor advisory is available at:

https://support.apple.com/en-us/HT208331

Vendor URL:  support.apple.com/en-us/HT208331 (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2018, SecurityGlobal.net LLC