ID

VAR-201704-0725


CVE

CVE-2017-2391


TITLE

plural Apple In the product export component iWork PDF Vulnerability that bypasses password protection

Trust: 0.8

sources: JVNDB: JVNDB-2017-002415

DESCRIPTION

An issue was discovered in certain Apple products. Pages before 6.1, Numbers before 4.1, and Keynote before 7.1 on macOS and Pages before 3.1, Numbers before 3.1, and Keynote before 3.1 on iOS are affected. The issue involves the "Export" component. It allows users to bypass iWork PDF password protection by leveraging use of 40-bit RC4. Apple iOS/Mac is prone to an information-disclosure vulnerability. An attacker can exploit this issue to obtain sensitive information that may lead to further attacks. Both Apple iOS and Mac are products of the American company Apple (Apple). The former is an operating system developed for mobile devices, while the latter is a computer product. Pages is one of the applications that provides word processing and page layout; Numbers is one of the electronic form applications; Keynote is one of the presentation applications. Attackers can exploit this vulnerability to disclose the content of password-protected PDFs. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-03-27-1 Pages 6.1, Numbers 4.1, and Keynote 7.1 for Mac; Pages 3.1, Numbers 3.1, and Keynote 3.1 for iOS are now available and address the following: Export Available for: macOS 10.12 Sierra or later, iOS 10 or later Impact: The contents of password-protected PDFs exported from iWork may be exposed Description: iWork used weak 40-bit RC4 encryption for password- protected PDF exports. Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJY2VkhAAoJEIOj74w0bLRGtMYQAMixdDDlyh/wWcT8bTLSekBU 6CqKrmus7LmaKyaqSjpzTlh4P40fLjpiPEukBzSerLeHlSBZ2mOpGcpXcC5evRDG GVJe5J7DeJyfk0Asta+9sgX/YAms9VcqZS9AxAVA7LeP1yspxAej6FMyP+vnvK6c y4SAzxlAZLjzMORaXnn/erp9SAtyyituD1TIhP4dIjcM7YNb0heKO46FCFVflcKd jqamu5A+W7D3i0f2dxlw5cN8J2Lpbeue/hoKT+thO+97zGjvUtqY53LOvOGcpYvD bxp3Ld2fCgCVgpalIrsvBYXbnBTgn/Mvve8dax2Ub0s95IxQkEr3SP1gr/YubSE9 EXg1PhmwnozUXsbZZV68nnQ2xfzc5CgjjojPBF8sg8BCFqXy4k5qkHi9sLdwxCis Hlcl6OyrkF+Puqjs3XZPzfSUKndL4pXiIv8H7nPgtCIsIF6BjABQGLUKOSNNtQwe ySAatdMCB1ut3NkSBh+yjIsK9QshiD9JbUhlZkLvkJhhcZp+rFac4adTN6U9svbO ehttNA2kPOW/YnYv42tk499cA+S3gHYHl7jzGnQNq2aQT/AZFg9lDJFYS0qqdLCW G0XaKDiSzsAkCa54UIyc2e+/St/b10kNXuTxKa/Q9Y9Mh9RtJUHHm0FrLPkevZJ7 MxmltI7TPqTEOCpaYFfd =cT2K -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2017-2391 // JVNDB: JVNDB-2017-002415 // BID: 97126 // VULHUB: VHN-110594 // VULMON: CVE-2017-2391 // PACKETSTORM: 141993

AFFECTED PRODUCTS

vendor:applemodel:numbersscope:lteversion:3.0.5

Trust: 1.0

vendor:applemodel:keynotescope:lteversion:3.0.5

Trust: 1.0

vendor:applemodel:numbersscope:lteversion:4.0.5

Trust: 1.0

vendor:applemodel:keynotescope:lteversion:7.0.5

Trust: 1.0

vendor:applemodel:pagesscope:lteversion:3.0.5

Trust: 1.0

vendor:applemodel:pagesscope:lteversion:6.0.5

Trust: 1.0

vendor:applemodel:keynotescope:ltversion:3.1 (ios 10.0 or later )

Trust: 0.8

vendor:applemodel:keynotescope:ltversion:7.1 (macos 10.12 or later )

Trust: 0.8

vendor:applemodel:numbersscope:ltversion:3.1 (ios 10.0 or later )

Trust: 0.8

vendor:applemodel:numbersscope:ltversion:4.1 (macos 10.12 or later )

Trust: 0.8

vendor:applemodel:pagesscope:ltversion:3.1 (ios 10.0 or later )

Trust: 0.8

vendor:applemodel:pagesscope:ltversion:6.1 (macos 10.12 or later )

Trust: 0.8

vendor:applemodel:pagesscope:eqversion:6.0.5

Trust: 0.6

vendor:applemodel:numbersscope:eqversion:3.0.5

Trust: 0.6

vendor:applemodel:keynotescope:eqversion:7.0.5

Trust: 0.6

vendor:applemodel:numbersscope:eqversion:4.0.5

Trust: 0.6

vendor:applemodel:pagesscope:eqversion:3.0.5

Trust: 0.6

vendor:applemodel:keynotescope:eqversion:3.0.5

Trust: 0.6

vendor:applemodel:pagesscope:eqversion:5.6

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:pagesscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:numbersscope:eqversion:3.6

Trust: 0.3

vendor:applemodel:numbersscope:eqversion:3.5

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:6.5

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:6.0

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.2

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:keynotescope:eqversion:5.0

Trust: 0.3

vendor:applemodel:pagesscope:neversion:6.1

Trust: 0.3

vendor:applemodel:pagesscope:neversion:3.1

Trust: 0.3

vendor:applemodel:numbersscope:neversion:4.1

Trust: 0.3

vendor:applemodel:numbersscope:neversion:3.1

Trust: 0.3

vendor:applemodel:keynotescope:neversion:7.1

Trust: 0.3

vendor:applemodel:keynotescope:neversion:3.1

Trust: 0.3

sources: BID: 97126 // JVNDB: JVNDB-2017-002415 // CNNVD: CNNVD-201703-1278 // NVD: CVE-2017-2391

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-2391
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-2391
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201703-1278
value: MEDIUM

Trust: 0.6

VULHUB: VHN-110594
value: MEDIUM

Trust: 0.1

VULMON: CVE-2017-2391
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-2391
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-110594
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-2391
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-110594 // VULMON: CVE-2017-2391 // JVNDB: JVNDB-2017-002415 // CNNVD: CNNVD-201703-1278 // NVD: CVE-2017-2391

PROBLEMTYPE DATA

problemtype:CWE-326

Trust: 1.9

sources: VULHUB: VHN-110594 // JVNDB: JVNDB-2017-002415 // NVD: CVE-2017-2391

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-1278

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201703-1278

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002415

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT207595url:https://support.apple.com/en-us/HT207595

Trust: 0.8

title:HT207595url:https://support.apple.com/ja-jp/HT207595

Trust: 0.8

title:Apple Pages , Numbers and Keynote for iOS and Mac Export Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68830

Trust: 0.6

title:Apple: Pages 6.1, Numbers 4.1, and Keynote 7.1 for Mac and Pages 3.1, Numbers 3.1, and Keynote 3.1 for iOSurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=567bff5986d19f178f6d7f28846c48c4

Trust: 0.1

sources: VULMON: CVE-2017-2391 // JVNDB: JVNDB-2017-002415 // CNNVD: CNNVD-201703-1278

EXTERNAL IDS

db:NVDid:CVE-2017-2391

Trust: 3.0

db:BIDid:97126

Trust: 2.1

db:SECTRACKid:1038135

Trust: 1.2

db:SECTRACKid:1038134

Trust: 1.2

db:SECTRACKid:1038136

Trust: 1.2

db:JVNid:JVNVU90482935

Trust: 0.8

db:JVNDBid:JVNDB-2017-002415

Trust: 0.8

db:CNNVDid:CNNVD-201703-1278

Trust: 0.7

db:NSFOCUSid:36243

Trust: 0.6

db:PACKETSTORMid:141993

Trust: 0.2

db:VULHUBid:VHN-110594

Trust: 0.1

db:VULMONid:CVE-2017-2391

Trust: 0.1

sources: VULHUB: VHN-110594 // VULMON: CVE-2017-2391 // BID: 97126 // JVNDB: JVNDB-2017-002415 // PACKETSTORM: 141993 // CNNVD: CNNVD-201703-1278 // NVD: CVE-2017-2391

REFERENCES

url:http://www.securityfocus.com/bid/97126

Trust: 1.9

url:https://support.apple.com/ht207595

Trust: 1.8

url:http://www.securitytracker.com/id/1038134

Trust: 1.2

url:http://www.securitytracker.com/id/1038135

Trust: 1.2

url:http://www.securitytracker.com/id/1038136

Trust: 1.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-2391

Trust: 0.9

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2391

Trust: 0.8

url:http://jvn.jp/vu/jvnvu90482935/index.html

Trust: 0.8

url:http://www.nsfocus.net/vulndb/36243

Trust: 0.6

url:http://www.apple.com/ios/

Trust: 0.3

url:https://support.apple.com/en-us/ht207595

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/326.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://support.apple.com/kb/ht207595

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://gpgtools.org

Trust: 0.1

sources: VULHUB: VHN-110594 // VULMON: CVE-2017-2391 // BID: 97126 // JVNDB: JVNDB-2017-002415 // PACKETSTORM: 141993 // CNNVD: CNNVD-201703-1278 // NVD: CVE-2017-2391

CREDITS

Philipp Eckel of ThoughtWorks.

Trust: 0.9

sources: BID: 97126 // CNNVD: CNNVD-201703-1278

SOURCES

db:VULHUBid:VHN-110594
db:VULMONid:CVE-2017-2391
db:BIDid:97126
db:JVNDBid:JVNDB-2017-002415
db:PACKETSTORMid:141993
db:CNNVDid:CNNVD-201703-1278
db:NVDid:CVE-2017-2391

LAST UPDATE DATE

2025-04-20T20:31:33.598000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-110594date:2017-07-12T00:00:00
db:VULMONid:CVE-2017-2391date:2017-07-12T00:00:00
db:BIDid:97126date:2017-03-29T01:02:00
db:JVNDBid:JVNDB-2017-002415date:2017-04-13T00:00:00
db:CNNVDid:CNNVD-201703-1278date:2017-03-31T00:00:00
db:NVDid:CVE-2017-2391date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-110594date:2017-04-02T00:00:00
db:VULMONid:CVE-2017-2391date:2017-04-02T00:00:00
db:BIDid:97126date:2017-03-27T00:00:00
db:JVNDBid:JVNDB-2017-002415date:2017-04-13T00:00:00
db:PACKETSTORMid:141993date:2017-03-27T14:44:44
db:CNNVDid:CNNVD-201703-1278date:2017-03-31T00:00:00
db:NVDid:CVE-2017-2391date:2017-04-02T01:59:00.667