ID

VAR-201702-0871


CVE

CVE-2017-2357


TITLE

Apple macOS of IOAudioFamily Vulnerability in component critical kernel memory layout information retrieval

Trust: 0.8

sources: JVNDB: JVNDB-2017-001548

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.12.3 is affected. The issue involves the "IOAudioFamily" component. It allows attackers to obtain sensitive kernel memory-layout information via a crafted app. Apple macOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, execute arbitrary code, to obtain sensitive information or cause a denial-of-service condition. IOAudioFamily is one of the input and output audio components. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-01-23-2 macOS 10.12.3 macOS 10.12.3 is now available and addresses the following: apache_mod_php Available for: macOS Sierra 10.12.2 Impact: Multiple issues in PHP Description: Multiple issues were addressed by updating to PHP version 5.6.28. CVE-2016-8670 CVE-2016-9933 CVE-2016-9934 Bluetooth Available for: macOS Sierra 10.12.2 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed through improved memory management. CVE-2017-2353: Ian Beer of Google Project Zero Graphics Drivers Available for: macOS Sierra 10.12.2 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed through improved input validation. CVE-2017-2358: Team Pangu and lokihardt at PwnFest 2016 Help Viewer Available for: macOS Sierra 10.12.2 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A cross-site scripting issue was addressed through improved URL validation. CVE-2017-2357: Team Pangu and lokihardt at PwnFest 2016 Kernel Available for: macOS Sierra 10.12.2 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-2370: Ian Beer of Google Project Zero Kernel Available for: macOS Sierra 10.12.2 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed through improved memory management. CVE-2017-2360: Ian Beer of Google Project Zero libarchive Available for: macOS Sierra 10.12.2 Impact: Unpacking a maliciously crafted archive may lead to arbitrary code execution Description: A buffer overflow issue was addressed through improved memory handling. CVE-2016-8687: Agostino Sarubbo of Gentoo Vim Available for: macOS Sierra 10.12.2 Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: An input validation issue existed in modelines. This was addressed through improved input validation. CVE-2016-1248: Florian Larysch WebKit Available for: macOS Sierra 10.12.2 Impact: A malicious website can open popups Description: An issue existed in the handling of blocking popups. This was addressed through improved input validation. CVE-2017-2371: lokihardt of Google Project Zero macOS 10.12.3 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://www.apple.com/support/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJYgqLhAAoJEIOj74w0bLRGymIQAMx3h6pTb1SLTCY4H4hUwQf2 tBd4osjrM7eX9kDBJXw9U3S5STs7Qyaiqjc+E3XvGXaeYQhZHurNEy+4HEaS2ctQ toj0S/meE1bhJ79SKnRuEso0dG2coYAMY4CMWZpF5haEPISunMDrmitIDX6BU8ds LhIvflT044wXzFsPbUfIMqG1a+1SHGoM3K0J61U6NU7dCSwyYmSGKH/0CTLuezy9 HOiPQJxvWVmfKVBZsYcaBp67AI5948LHdvat3gRq9WpgWpjUFjW/tLSbvZObaIjn +I3JkVZ9ETuXa+ig42h+CJTz/CozqlC1OpX1YLJLMh4h5+kY9PNwh1kcsv+8jKxo cbPNatn2uzoigRTWuhCe4Tic6kgri+3c8qR+ZPspNpUyLmentjpbygrkOKVLlNnG HmV0YIWA+zp4TVgeMnqoEPTHF9kxxhBSPOjgyL2oYwpMHyXb2gmho7Xl9gQirw5T Nyaoup4A7eT9jR5FBcAvhPPm5I+J44qEKB/D9hvWcQLGf1PR9/zxVd5QxlJZgm9u loqWBNhPAqD36SPIOsIbkcjAaBKsrEAV01AizkMrhrN1KySscXeZeZ84p4nJusdD M7bFysYMv7fvNe65V4I2Tc2iujqiPHsXdLRioAWSk7giNRggQtaM8s/C0KYtrJdK ykSG8JpyNuTNAl1HJtv6 =pBIh -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2017-2357 // JVNDB: JVNDB-2017-001548 // BID: 95723 // VULHUB: VHN-110560 // PACKETSTORM: 140687

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:eqversion:10.12.2

Trust: 1.4

vendor:applemodel:mac os xscope:lteversion:10.12.2

Trust: 1.0

vendor:applemodel:macosscope:eqversion:10.12.2

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.12.3

Trust: 0.3

sources: BID: 95723 // JVNDB: JVNDB-2017-001548 // CNNVD: CNNVD-201702-456 // NVD: CVE-2017-2357

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2357
value: LOW

Trust: 1.0

NVD: CVE-2017-2357
value: LOW

Trust: 0.8

CNNVD: CNNVD-201702-456
value: MEDIUM

Trust: 0.6

VULHUB: VHN-110560
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-2357
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-110560
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2357
baseSeverity: LOW
baseScore: 3.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 1.4
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-110560 // JVNDB: JVNDB-2017-001548 // CNNVD: CNNVD-201702-456 // NVD: CVE-2017-2357

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-110560 // JVNDB: JVNDB-2017-001548 // NVD: CVE-2017-2357

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201702-456

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201702-456

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-001548

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2017-01-23-2 macOS 10.12.3url:https://lists.apple.com/archives/security-announce/2017/Jan/msg00003.html

Trust: 0.8

title:HT207483url:https://support.apple.com/en-us/HT207483

Trust: 0.8

title:HT207483url:https://support.apple.com/ja-jp/HT207483

Trust: 0.8

title:Apple macOS Sierra IOAudioFamily Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=67747

Trust: 0.6

sources: JVNDB: JVNDB-2017-001548 // CNNVD: CNNVD-201702-456

EXTERNAL IDS

db:NVDid:CVE-2017-2357

Trust: 2.9

db:BIDid:95723

Trust: 2.0

db:SECTRACKid:1037671

Trust: 1.1

db:JVNid:JVNVU97915630

Trust: 0.8

db:JVNDBid:JVNDB-2017-001548

Trust: 0.8

db:CNNVDid:CNNVD-201702-456

Trust: 0.7

db:VULHUBid:VHN-110560

Trust: 0.1

db:PACKETSTORMid:140687

Trust: 0.1

sources: VULHUB: VHN-110560 // BID: 95723 // JVNDB: JVNDB-2017-001548 // PACKETSTORM: 140687 // CNNVD: CNNVD-201702-456 // NVD: CVE-2017-2357

REFERENCES

url:http://www.securityfocus.com/bid/95723

Trust: 1.7

url:https://support.apple.com/ht207483

Trust: 1.7

url:http://www.securitytracker.com/id/1037671

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2357

Trust: 0.8

url:http://jvn.jp/vu/jvnvu97915630/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-2357

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

url:https://www.apple.com/support/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9933

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2358

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2353

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-9934

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8687

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2370

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2360

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2371

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-8670

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-2357

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-1248

Trust: 0.1

sources: VULHUB: VHN-110560 // BID: 95723 // JVNDB: JVNDB-2017-001548 // PACKETSTORM: 140687 // CNNVD: CNNVD-201702-456 // NVD: CVE-2017-2357

CREDITS

Ian Beer of Google Project Zero, Team Pangu and lokihardt at PwnFest 2016, lokihardt of Google Project Zero,

Trust: 0.9

sources: BID: 95723 // CNNVD: CNNVD-201702-456

SOURCES

db:VULHUBid:VHN-110560
db:BIDid:95723
db:JVNDBid:JVNDB-2017-001548
db:PACKETSTORMid:140687
db:CNNVDid:CNNVD-201702-456
db:NVDid:CVE-2017-2357

LAST UPDATE DATE

2025-04-20T21:51:20.344000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-110560date:2017-07-26T00:00:00
db:BIDid:95723date:2017-02-02T01:00:00
db:JVNDBid:JVNDB-2017-001548date:2017-02-27T00:00:00
db:CNNVDid:CNNVD-201702-456date:2017-02-27T00:00:00
db:NVDid:CVE-2017-2357date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-110560date:2017-02-20T00:00:00
db:BIDid:95723date:2017-01-23T00:00:00
db:JVNDBid:JVNDB-2017-001548date:2017-02-27T00:00:00
db:PACKETSTORMid:140687date:2017-01-24T00:57:11
db:CNNVDid:CNNVD-201702-456date:2017-01-23T00:00:00
db:NVDid:CVE-2017-2357date:2017-02-20T08:59:04.887