ID

VAR-201710-1371


CVE

CVE-2017-7123


TITLE

Apple macOS Third party file Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2017-009328

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.13 is affected. The issue involves the third-party "file" product. Versions before 5.30 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. Apple macOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code or bypass security restrictions and perform unauthorized actions. Failed exploit attempts will likely cause a denial-of-service condition. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. file is one of the file system components. A security vulnerability exists in the file component prior to 5.30 in versions of Apple macOS High Sierra prior to 10.13

Trust: 1.98

sources: NVD: CVE-2017-7123 // JVNDB: JVNDB-2017-009328 // BID: 100993 // VULHUB: VHN-115326

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.12.6

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.8 or later 10.13

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.12.6

Trust: 0.6

vendor:applemodel:macosscope:eqversion:10.12.6

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.5

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.4

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.3

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.2

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.1

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.13

Trust: 0.3

sources: BID: 100993 // JVNDB: JVNDB-2017-009328 // CNNVD: CNNVD-201703-1087 // NVD: CVE-2017-7123

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7123
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-7123
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201703-1087
value: HIGH

Trust: 0.6

VULHUB: VHN-115326
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-7123
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-115326
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7123
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-115326 // JVNDB: JVNDB-2017-009328 // CNNVD: CNNVD-201703-1087 // NVD: CVE-2017-7123

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-115326 // JVNDB: JVNDB-2017-009328 // NVD: CVE-2017-7123

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-1087

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201703-1087

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009328

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT208144url:https://support.apple.com/en-us/HT208144

Trust: 0.8

title:HT208144url:https://support.apple.com/ja-jp/HT208144

Trust: 0.8

sources: JVNDB: JVNDB-2017-009328

EXTERNAL IDS

db:NVDid:CVE-2017-7123

Trust: 2.8

db:BIDid:100993

Trust: 1.4

db:JVNid:JVNVU99806334

Trust: 0.8

db:JVNDBid:JVNDB-2017-009328

Trust: 0.8

db:CNNVDid:CNNVD-201703-1087

Trust: 0.7

db:VULHUBid:VHN-115326

Trust: 0.1

sources: VULHUB: VHN-115326 // BID: 100993 // JVNDB: JVNDB-2017-009328 // CNNVD: CNNVD-201703-1087 // NVD: CVE-2017-7123

REFERENCES

url:https://support.apple.com/ht208144

Trust: 1.7

url:http://www.securityfocus.com/bid/100993

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7123

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99806334/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-7123

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

sources: VULHUB: VHN-115326 // BID: 100993 // JVNDB: JVNDB-2017-009328 // CNNVD: CNNVD-201703-1087 // NVD: CVE-2017-7123

CREDITS

Daniel Jalkut of Red Sweater Software, Brandon Azad, Tim Kingman, Xiaolong Bai, Min (Spark) Zheng of Alibaba Inc., Benjamin Gnahm (@mitp0sh) of PDX.

Trust: 0.3

sources: BID: 100993

SOURCES

db:VULHUBid:VHN-115326
db:BIDid:100993
db:JVNDBid:JVNDB-2017-009328
db:CNNVDid:CNNVD-201703-1087
db:NVDid:CVE-2017-7123

LAST UPDATE DATE

2024-11-23T20:20:03.622000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-115326date:2017-10-25T00:00:00
db:BIDid:100993date:2017-09-25T00:00:00
db:JVNDBid:JVNDB-2017-009328date:2017-11-09T00:00:00
db:CNNVDid:CNNVD-201703-1087date:2017-10-24T00:00:00
db:NVDid:CVE-2017-7123date:2024-11-21T03:31:13.213

SOURCES RELEASE DATE

db:VULHUBid:VHN-115326date:2017-10-23T00:00:00
db:BIDid:100993date:2017-09-25T00:00:00
db:JVNDBid:JVNDB-2017-009328date:2017-11-09T00:00:00
db:CNNVDid:CNNVD-201703-1087date:2017-03-27T00:00:00
db:NVDid:CVE-2017-7123date:2017-10-23T01:29:13.237