Remote code execution in Apple Safari

Published: 2017-12-13 00:00:00
Severity High
Patch available YES
Number of vulnerabilities 5
CVE ID CVE-2017-7156
CVE-2017-7157
CVE-2017-13856
CVE-2017-13870
CVE-2017-13866
CVSSv3 8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CWE ID CWE-119
Exploitation vector Network
Public exploit Not available
Vulnerable software Apple Safari
Vulnerable software versions Apple Safari 10.1.2
Apple Safari 10.1.1
Apple Safari 10.1.0
Vendor URL Apple Inc.

Security Advisory

1) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 11.0.2.

External links

https://support.apple.com/en-us/HT208324

2) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 11.0.2.

External links

https://support.apple.com/en-us/HT208324

3) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 11.0.2.

External links

https://support.apple.com/en-us/HT208324

4) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 11.0.2.

External links

https://support.apple.com/en-us/HT208324

5) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 11.0.2.

External links

https://support.apple.com/en-us/HT208324

Back to List