mercredi 3 juin 2020    || Inscription
BanniereAlertes
 
 

Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

lundi 29 octobre 2018

Apple macOS up to 10.14.0 APR memory corruption

A vulnerability was found in Apple macOS up to 10.14.0 and classified as critical. This issue affects an unknown function of the component APR. The manipulation with an unknown input leads to a memory corruption vulnerability. Using CWE to declare the problem leads to CWE-119. Impacted is confidentiality, integrity, and availability.

The weakness was published 10/29/2018 by Craig Young with Tripwire VERT as HT209193 as confirmed advisory (Website). It is possible to read the advisory at support.apple.com. The identification of this vulnerability is CVE-2017-1261. The technical details are unknown and an exploit is not publicly available. The pricing for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 10/31/2018). It expected to see the exploit prices for this product increasing in the near future. The advisory points out:

Multiple issues in Perl were addressed with improved memory handling.

Upgrading to version 10.14.1 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.

Similar entries are available at 110855, 126271, 126272 and 126273.

CPE

CVSSv3

VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3

VulDB Base Score: ≈5.5
VulDB Temp Score: ≈5.3
VulDB Vector: 🔒
VulDB Reliability: 🔍

CVSSv2

VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍

Exploiting

Class: Memory corruption (CWE-119)
Local: Yes
Remote: No

Availability: No

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligence

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Actions: 🔍

Countermeasures

Recommended: Upgrade
Status: Official fix
Reaction Time: 🔒
0-Day Time: 🔒
Exposure Time: 🔒

Upgrade: macOS 10.14.1

Timeline

10/29/2018 Advisory disclosed
10/29/2018 Countermeasure disclosed
10/31/2018 VulDB entry created
10/31/2018 VulDB last update

Sources

Advisory: HT209193
Researcher: Craig Young
Organization: Tripwire VERT
Status: Confirmed

CVE: CVE-2017-1261 (🔒)
scip Labs: https://www.scip.ch/en/?labs.20180712
See also: 🔒

Entry

Created: 10/31/2018
Complete: 🔍

Lien vers l'article source

Auteur: VulDB

Catégories: VulDBNombre de vues: 133

x

Événements SSI