SB2017092006 - Remote code execution in Apple Xcode
Published: September 20, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2017-7076)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted Mach-O file, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
2) Memory corruption (CVE-ID: CVE-2017-7134)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted Mach-O file, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
3) Memory corruption (CVE-ID: CVE-2017-7135)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted Mach-O file, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
4) Memory corruption (CVE-ID: CVE-2017-7136)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted Mach-O file, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
5) Memory corruption (CVE-ID: CVE-2017-7137)
The vulnerability allows a remote attacker to execute arbitrary code.The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted Mach-O file, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Install update from vendor's website.