René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

169 lines
5.1 KiB
JSON

{
"id": "CVE-2017-2501",
"sourceIdentifier": "product-security@apple.com",
"published": "2017-05-22T05:29:00.520",
"lastModified": "2019-03-21T21:47:23.067",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the \"Kernel\" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app."
},
{
"lang": "es",
"value": "Fue encontrado un problema en ciertos productos de Apple. iOS versi\u00f3n anterior a 10.3.2 se ve afectado. MacOS versi\u00f3n anterior a 10.12.5 se ve afectado. TVOS versi\u00f3n anterior a 10.2.1 se ve afectado. WatchOS versi\u00f3n anterior a 3.2.2 se ve afectado. El tema involucra el componente \"Kernel\". Una condici\u00f3n de carrera permite a los atacantes ejecutar c\u00f3digo arbitrario en un contexto privilegiado por medio de una aplicaci\u00f3n creada."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6
},
"baseSeverity": "HIGH",
"exploitabilityScore": 4.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.3.2",
"matchCriteriaId": "708FF05D-EDB2-4CE2-B689-F79A0A80CAF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.12.5",
"matchCriteriaId": "4FBED4E2-D14C-4884-99A4-8DD729D4EE3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.2.1",
"matchCriteriaId": "5118C36B-1C20-4481-8207-0E4435D60DAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2.2",
"matchCriteriaId": "69FDE126-98A5-4BA8-B963-0D1B5EB008A0"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/98468",
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.securitytracker.com/id/1038484",
"source": "product-security@apple.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://support.apple.com/HT207797",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT207798",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT207800",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT207801",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.exploit-db.com/exploits/42054/",
"source": "product-security@apple.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}