Multiple vulnerabilities in Apple iCloud

Published: 2017-12-14 11:39:48 | Updated: 2017-12-18 14:41:32
Severity High
Patch available YES
Number of vulnerabilities 6
CVSSv2 6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
6.9 (AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5 (AV:N/AC:L/Au:S/C:C/I:N/A:N/E:U/RL:OF/RC:C)
CVSSv3 8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
8.3 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
5.5 [CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE ID CVE-2017-13856
CVE-2017-13866
CVE-2017-13870
CVE-2017-7156
CVE-2017-7157
CVE-2017-13864
CWE ID CWE-119
CWE-200
Exploitation vector Network
Public exploit Not available
Vulnerable software iCloud for Windows
Vulnerable software versions iCloud for Windows 6.2.2
iCloud for Windows 6.2.1
iCloud for Windows 6.2
Show more
Vendor URL Apple Inc.
Advisory type Public

Security Advisory

1) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 7.2.

External links

https://support.apple.com/en-us/HT208328

2) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 7.2.

External links

https://support.apple.com/en-us/HT208328

3) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 7.2.

External links

https://support.apple.com/en-us/HT208328

4) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 7.2.

External links

https://support.apple.com/en-us/HT208328

5) Memory corruption

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error when handling malicious input. A remote attacker can trick the victim into loading a specially crafted web content, trigger memory corruption in the WebKit component and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 7.2.

External links

https://support.apple.com/en-us/HT208328

6) Information disclosure

Description

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information on the target system.

The weakness exists due to a privacy issue in the use of client certificates. A remote attacker can obtain credentials and track the user's actions.

Remediation

Update to version 7.2.

External links

https://support.apple.com/en-us/HT208328

Back to List