ID

VAR-201710-1382


CVE

CVE-2017-7135


TITLE

Apple Xcode of ld64 Vulnerability in arbitrary code execution in components

Trust: 0.8

sources: JVNDB: JVNDB-2017-009300

DESCRIPTION

An issue was discovered in certain Apple products. Xcode before 9 is affected. The issue involves the "ld64" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Mach-O file. Apple Xcode is prone to multiple memory corruption vulnerabilities. Failed exploit attempts may result in a denial-of-service condition. Versions prior to Xcode 9 are vulnerable. Apple Xcode is an integrated development environment provided by Apple (Apple) to developers. It is mainly used to develop applications for Mac OS X and iOS. ld64 is one of the linker components. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-09-19-3 Xcode 9 Xcode 9 is now available and addresses the following: Git Available for: macOS Sierra 10.12.6 or later Impact: Checking out a maliciously crafted repository may lead to arbitrary code execution Description: An ssh:// URL scheme handling issue was addressed through improved input validation. CVE-2017-7076: riusksk (ae3aY=) of Tencent Security Platform Department CVE-2017-7134: riusksk (ae3aY=) of Tencent Security Platform Department CVE-2017-7135: riusksk (ae3aY=) of Tencent Security Platform Department CVE-2017-7136: riusksk (ae3aY=) of Tencent Security Platform Department CVE-2017-7137: riusksk (ae3aY=) of Tencent Security Platform Department subversion Available for: macOS Sierra 10.12.6 or later Impact: Checking out a maliciously crafted repository may lead to arbitrary code execution Description: An input validation issue was addressed through improved input validation. CVE-2017-9800 Installation note: Xcode 9 may be obtained from: https://developer.apple.com/xcode/downloads/ To check that the Xcode has been updated: * Select Xcode in the menu bar * Select About Xcode * The version after applying this update will be "9". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJZwVI5AAoJEIOj74w0bLRG//MQAMZhTTHk4DQEuoWwW7U63c+R TVo7gRf4AVVQWJ+4FU4fT/I0l8IuxhTOfG14+sumHtsOIQV0evsAGeA9k4+RAgo8 N1DIJ3mZxYobd8KfP0DXt8fX4yfjYtLmTDJqMRvGZ6765UK+ctRQYCuN/+TWR0BM CyU6UqVQVhN+Z/Lgg8CnK2KTFbykMCHgZ7EYrwIhY3z9SvOiFCakXxUlZkLcziov 7Mkr/BKv6YlMVB+r/keuifLn2fOxa51Ic+k/n1Vb5wBmOEA2DH0w8NaBJeA/aPNd Cgwj750S0gjPG7Zk/IAOy17TJJzor2Ewrvb6wNQB5zzb32TScw58mOzydyLg0jBl j0D1k7d2+f31utzkT9gcvkq6490HginWdmUzwXuZV8dMz/Bwc4dJlF7u9gXBGrZe SymSagb28TxFVZHHO7nOVuydmafgB4tSJ9yQq4vASDbOso0pScPuAw6FhpPBaKb+ IiLpYJOOO2pJpSfgq0Z3U/rV7X2WBGcRJoJLYNXVQyyyCEXmMIAzEurn3nXUh75f LKMZxT1i3Q37KfSxOmx3o7bh9MeE3/FrZQsYRFunCAESAxn3s+JoF+EMXSjC0k5V t5mz1t+qaPkI1cQYXRxi/PwfcXUqNtXwdngrr3dVXqL8V+Yx9oVWQiC1OB60aP4i qcRPihCW7/qqjks6q8Ew =Bzk4 -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2017-7135 // JVNDB: JVNDB-2017-009300 // BID: 100894 // VULHUB: VHN-115338 // PACKETSTORM: 144271

AFFECTED PRODUCTS

vendor:applemodel:xcodescope:lteversion:8.3.3

Trust: 1.0

vendor:applemodel:xcodescope:ltversion:9 (macos sierra 10.12.6 or later )

Trust: 0.8

vendor:applemodel:xcodescope:eqversion:8.3.3

Trust: 0.6

vendor:applemodel:xcodescope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.4.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:8.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:8

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:7.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:7.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:7.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:7.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:6.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:5.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:4.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.5

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.4

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.3

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:xcodescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.6

Trust: 0.3

vendor:applemodel:xcodescope:neversion:9

Trust: 0.3

sources: BID: 100894 // JVNDB: JVNDB-2017-009300 // CNNVD: CNNVD-201703-978 // NVD: CVE-2017-7135

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7135
value: HIGH

Trust: 1.0

NVD: CVE-2017-7135
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201703-978
value: MEDIUM

Trust: 0.6

VULHUB: VHN-115338
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-7135
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-115338
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7135
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-115338 // JVNDB: JVNDB-2017-009300 // CNNVD: CNNVD-201703-978 // NVD: CVE-2017-7135

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-115338 // JVNDB: JVNDB-2017-009300 // NVD: CVE-2017-7135

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-978

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201703-978

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009300

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT208103url:https://support.apple.com/en-us/HT208103

Trust: 0.8

title:HT208103url:https://support.apple.com/ja-jp/HT208103

Trust: 0.8

sources: JVNDB: JVNDB-2017-009300

EXTERNAL IDS

db:NVDid:CVE-2017-7135

Trust: 2.9

db:BIDid:100894

Trust: 1.4

db:SECTRACKid:1039386

Trust: 1.1

db:JVNid:JVNVU99806334

Trust: 0.8

db:JVNDBid:JVNDB-2017-009300

Trust: 0.8

db:CNNVDid:CNNVD-201703-978

Trust: 0.7

db:VULHUBid:VHN-115338

Trust: 0.1

db:PACKETSTORMid:144271

Trust: 0.1

sources: VULHUB: VHN-115338 // BID: 100894 // JVNDB: JVNDB-2017-009300 // PACKETSTORM: 144271 // CNNVD: CNNVD-201703-978 // NVD: CVE-2017-7135

REFERENCES

url:https://support.apple.com/ht208103

Trust: 1.7

url:http://www.securityfocus.com/bid/100894

Trust: 1.1

url:http://www.securitytracker.com/id/1039386

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7135

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7135

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99806334/index.html

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:https://developer.apple.com/xcode/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-7134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-9800

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7137

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-1000117

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7136

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://developer.apple.com/xcode/downloads/

Trust: 0.1

url:https://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-7076

Trust: 0.1

sources: VULHUB: VHN-115338 // BID: 100894 // JVNDB: JVNDB-2017-009300 // PACKETSTORM: 144271 // CNNVD: CNNVD-201703-978 // NVD: CVE-2017-7135

CREDITS

riusksk of Tencent Security Platform Department

Trust: 0.3

sources: BID: 100894

SOURCES

db:VULHUBid:VHN-115338
db:BIDid:100894
db:JVNDBid:JVNDB-2017-009300
db:PACKETSTORMid:144271
db:CNNVDid:CNNVD-201703-978
db:NVDid:CVE-2017-7135

LAST UPDATE DATE

2024-08-14T12:39:04.671000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-115338date:2017-10-27T00:00:00
db:BIDid:100894date:2017-09-19T00:00:00
db:JVNDBid:JVNDB-2017-009300date:2017-11-08T00:00:00
db:CNNVDid:CNNVD-201703-978date:2017-10-24T00:00:00
db:NVDid:CVE-2017-7135date:2017-10-27T13:53:08.667

SOURCES RELEASE DATE

db:VULHUBid:VHN-115338date:2017-10-23T00:00:00
db:BIDid:100894date:2017-09-19T00:00:00
db:JVNDBid:JVNDB-2017-009300date:2017-11-08T00:00:00
db:PACKETSTORMid:144271date:2017-09-20T20:22:22
db:CNNVDid:CNNVD-201703-978date:2017-03-23T00:00:00
db:NVDid:CVE-2017-7135date:2017-10-23T01:29:13.657