ID

VAR-201702-0867


CVE

CVE-2017-2353


TITLE

Apple macOS of Bluetooth Component vulnerable to arbitrary code execution in privileged context

Trust: 0.8

sources: JVNDB: JVNDB-2017-001547

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.12.3 is affected. The issue involves the "Bluetooth" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (use-after-free) via a crafted app. Apple macOS is prone to multiple security vulnerabilities. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-01-23-2 macOS 10.12.3 macOS 10.12.3 is now available and addresses the following: apache_mod_php Available for: macOS Sierra 10.12.2 Impact: Multiple issues in PHP Description: Multiple issues were addressed by updating to PHP version 5.6.28. CVE-2017-2353: Ian Beer of Google Project Zero Graphics Drivers Available for: macOS Sierra 10.12.2 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-2017-2358: Team Pangu and lokihardt at PwnFest 2016 Help Viewer Available for: macOS Sierra 10.12.2 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A cross-site scripting issue was addressed through improved URL validation. CVE-2017-2361: lokihardt of Google Project Zero IOAudioFamily Available for: macOS Sierra 10.12.2 Impact: An application may be able to determine kernel memory layout Description: An uninitialized memory issue was addressed through improved memory management. CVE-2017-2357: Team Pangu and lokihardt at PwnFest 2016 Kernel Available for: macOS Sierra 10.12.2 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-2370: Ian Beer of Google Project Zero Kernel Available for: macOS Sierra 10.12.2 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed through improved memory management. CVE-2017-2360: Ian Beer of Google Project Zero libarchive Available for: macOS Sierra 10.12.2 Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: A buffer overflow issue was addressed through improved memory handling. CVE-2016-8687: Agostino Sarubbo of Gentoo Vim Available for: macOS Sierra 10.12.2 Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: An input validation issue existed in modelines. This was addressed through improved input validation. CVE-2016-1248: Florian Larysch WebKit Available for: macOS Sierra 10.12.2 Impact: A malicious website can open popups Description: An issue existed in the handling of blocking popups. This was addressed through improved input validation. CVE-2017-2371: lokihardt of Google Project Zero macOS 10.12.3 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJYgqLhAAoJEIOj74w0bLRGymIQAMx3h6pTb1SLTCY4H4hUwQf2 tBd4osjrM7eX9kDBJXw9U3S5STs7Qyaiqjc+E3XvGXaeYQhZHurNEy+4HEaS2ctQ toj0S/meE1bhJ79SKnRuEso0dG2coYAMY4CMWZpF5haEPISunMDrmitIDX6BU8ds LhIvflT044wXzFsPbUfIMqG1a+1SHGoM3K0J61U6NU7dCSwyYmSGKH/0CTLuezy9 HOiPQJxvWVmfKVBZsYcaBp67AI5948LHdvat3gRq9WpgWpjUFjW/tLSbvZObaIjn +I3JkVZ9ETuXa+ig42h+CJTz/CozqlC1OpX1YLJLMh4h5+kY9PNwh1kcsv+8jKxo cbPNatn2uzoigRTWuhCe4Tic6kgri+3c8qR+ZPspNpUyLmentjpbygrkOKVLlNnG HmV0YIWA+zp4TVgeMnqoEPTHF9kxxhBSPOjgyL2oYwpMHyXb2gmho7Xl9gQirw5T Nyaoup4A7eT9jR5FBcAvhPPm5I+J44qEKB/D9hvWcQLGf1PR9/zxVd5QxlJZgm9u loqWBNhPAqD36SPIOsIbkcjAaBKsrEAV01AizkMrhrN1KySscXeZeZ84p4nJusdD M7bFysYMv7fvNe65V4I2Tc2iujqiPHsXdLRioAWSk7giNRggQtaM8s/C0KYtrJdK ykSG8JpyNuTNAl1HJtv6 =pBIh -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2017-2353 // JVNDB: JVNDB-2017-001547 // BID: 95723 // VULHUB: VHN-110556 // PACKETSTORM: 140687

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.12.2

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.12.2

Trust: 1.0

vendor:applemodel:macosscope:eqversion:10.12.2

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.12.3

Trust: 0.3

sources: BID: 95723 // JVNDB: JVNDB-2017-001547 // CNNVD: CNNVD-201702-453 // NVD: CVE-2017-2353

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2353
value: HIGH

Trust: 1.0

NVD: CVE-2017-2353
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201702-453
value: CRITICAL

Trust: 0.6

VULHUB: VHN-110556
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-2353
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-110556
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2353
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-110556 // JVNDB: JVNDB-2017-001547 // CNNVD: CNNVD-201702-453 // NVD: CVE-2017-2353

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.9

sources: VULHUB: VHN-110556 // JVNDB: JVNDB-2017-001547 // NVD: CVE-2017-2353

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-453

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201702-453

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-001547

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-110556

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2017-01-23-2 macOS 10.12.3url:https://lists.apple.com/archives/security-announce/2017/Jan/msg00003.html

Trust: 0.8

title:HT207483url:https://support.apple.com/en-us/HT207483

Trust: 0.8

title:HT207483url:https://support.apple.com/ja-jp/HT207483

Trust: 0.8

title:Apple macOS Sierra Bluetooth Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=67744

Trust: 0.6

sources: JVNDB: JVNDB-2017-001547 // CNNVD: CNNVD-201702-453

EXTERNAL IDS

db:NVDid:CVE-2017-2353

Trust: 2.9

db:BIDid:95723

Trust: 2.0

db:SECTRACKid:1037671

Trust: 1.1

db:EXPLOIT-DBid:41164

Trust: 1.1

db:JVNid:JVNVU97915630

Trust: 0.8

db:JVNDBid:JVNDB-2017-001547

Trust: 0.8

db:CNNVDid:CNNVD-201702-453

Trust: 0.7

db:PACKETSTORMid:140742

Trust: 0.1

db:VULHUBid:VHN-110556

Trust: 0.1

db:PACKETSTORMid:140687

Trust: 0.1

sources: VULHUB: VHN-110556 // BID: 95723 // JVNDB: JVNDB-2017-001547 // PACKETSTORM: 140687 // CNNVD: CNNVD-201702-453 // NVD: CVE-2017-2353

REFERENCES

url:http://www.securityfocus.com/bid/95723

Trust: 1.7

url:https://support.apple.com/ht207483

Trust: 1.7

url:https://www.exploit-db.com/exploits/41164/

Trust: 1.1

url:http://www.securitytracker.com/id/1037671

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2353

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97915630/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-2353

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:https://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9933

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2358

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2353

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9934

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8687

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2360

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2371

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8670

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2357

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1248

Trust: 0.1

sources: VULHUB: VHN-110556 // BID: 95723 // JVNDB: JVNDB-2017-001547 // PACKETSTORM: 140687 // CNNVD: CNNVD-201702-453 // NVD: CVE-2017-2353

CREDITS

Ian Beer of Google Project Zero, Team Pangu and lokihardt at PwnFest 2016, lokihardt of Google Project Zero,

Trust: 0.9

sources: BID: 95723 // CNNVD: CNNVD-201702-453

SOURCES

db:VULHUBid:VHN-110556
db:BIDid:95723
db:JVNDBid:JVNDB-2017-001547
db:PACKETSTORMid:140687
db:CNNVDid:CNNVD-201702-453
db:NVDid:CVE-2017-2353

LAST UPDATE DATE

2024-11-23T20:11:40.870000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-110556date:2017-09-02T00:00:00
db:BIDid:95723date:2017-02-02T01:00:00
db:JVNDBid:JVNDB-2017-001547date:2017-02-27T00:00:00
db:CNNVDid:CNNVD-201702-453date:2017-03-01T00:00:00
db:NVDid:CVE-2017-2353date:2024-11-21T03:23:21.060

SOURCES RELEASE DATE

db:VULHUBid:VHN-110556date:2017-02-20T00:00:00
db:BIDid:95723date:2017-01-23T00:00:00
db:JVNDBid:JVNDB-2017-001547date:2017-02-27T00:00:00
db:PACKETSTORMid:140687date:2017-01-24T00:57:11
db:CNNVDid:CNNVD-201702-453date:2017-01-23T00:00:00
db:NVDid:CVE-2017-2353date:2017-02-20T08:59:04.743