ID

VAR-201710-1369


CVE

CVE-2017-7121


TITLE

Apple macOS Third party file Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2017-009326

DESCRIPTION

An issue was discovered in certain Apple products. macOS before 10.13 is affected. The issue involves the third-party "file" product. Versions before 5.30 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. Apple macOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code or bypass security restrictions and perform unauthorized actions. Failed exploit attempts will likely cause a denial-of-service condition. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. file is one of the file system components. A security vulnerability exists in the file component prior to 5.30 in versions of Apple macOS High Sierra prior to 10.13

Trust: 1.98

sources: NVD: CVE-2017-7121 // JVNDB: JVNDB-2017-009326 // BID: 100993 // VULHUB: VHN-115324

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.12.6

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.8 or later 10.13

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.12.6

Trust: 0.6

vendor:applemodel:macosscope:eqversion:10.12.6

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.5

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.4

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.3

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.2

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.1

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.13

Trust: 0.3

sources: BID: 100993 // JVNDB: JVNDB-2017-009326 // CNNVD: CNNVD-201703-1089 // NVD: CVE-2017-7121

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7121
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-7121
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201703-1089
value: HIGH

Trust: 0.6

VULHUB: VHN-115324
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-7121
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-115324
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7121
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-115324 // JVNDB: JVNDB-2017-009326 // CNNVD: CNNVD-201703-1089 // NVD: CVE-2017-7121

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-115324 // JVNDB: JVNDB-2017-009326 // NVD: CVE-2017-7121

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201703-1089

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201703-1089

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-009326

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT208144url:https://support.apple.com/en-us/HT208144

Trust: 0.8

title:HT208144url:https://support.apple.com/ja-jp/HT208144

Trust: 0.8

sources: JVNDB: JVNDB-2017-009326

EXTERNAL IDS

db:NVDid:CVE-2017-7121

Trust: 2.8

db:BIDid:100993

Trust: 1.4

db:JVNid:JVNVU99806334

Trust: 0.8

db:JVNDBid:JVNDB-2017-009326

Trust: 0.8

db:CNNVDid:CNNVD-201703-1089

Trust: 0.7

db:VULHUBid:VHN-115324

Trust: 0.1

sources: VULHUB: VHN-115324 // BID: 100993 // JVNDB: JVNDB-2017-009326 // CNNVD: CNNVD-201703-1089 // NVD: CVE-2017-7121

REFERENCES

url:https://support.apple.com/ht208144

Trust: 1.7

url:http://www.securityfocus.com/bid/100993

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7121

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99806334/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-7121

Trust: 0.8

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/macosx/

Trust: 0.3

sources: VULHUB: VHN-115324 // BID: 100993 // JVNDB: JVNDB-2017-009326 // CNNVD: CNNVD-201703-1089 // NVD: CVE-2017-7121

CREDITS

Daniel Jalkut of Red Sweater Software, Brandon Azad, Tim Kingman, Xiaolong Bai, Min (Spark) Zheng of Alibaba Inc., Benjamin Gnahm (@mitp0sh) of PDX.

Trust: 0.3

sources: BID: 100993

SOURCES

db:VULHUBid:VHN-115324
db:BIDid:100993
db:JVNDBid:JVNDB-2017-009326
db:CNNVDid:CNNVD-201703-1089
db:NVDid:CVE-2017-7121

LAST UPDATE DATE

2025-04-20T20:47:21.745000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-115324date:2017-10-25T00:00:00
db:BIDid:100993date:2017-09-25T00:00:00
db:JVNDBid:JVNDB-2017-009326date:2017-11-09T00:00:00
db:CNNVDid:CNNVD-201703-1089date:2017-10-24T00:00:00
db:NVDid:CVE-2017-7121date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-115324date:2017-10-23T00:00:00
db:BIDid:100993date:2017-09-25T00:00:00
db:JVNDBid:JVNDB-2017-009326date:2017-11-09T00:00:00
db:CNNVDid:CNNVD-201703-1089date:2017-03-27T00:00:00
db:NVDid:CVE-2017-7121date:2017-10-23T01:29:13.173