ID

VAR-201712-0262


CVE

CVE-2017-13864


TITLE

Windows for Apple iCloud and iTunes of APNs Server component vulnerability in server components

Trust: 0.8

sources: JVNDB: JVNDB-2017-011449

DESCRIPTION

An issue was discovered in certain Apple products. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. The issue involves the "APNs Server" component. It allows man-in-the-middle attackers to track users by leveraging mishandling of client certificates. Apple iCloud/iTunes are prone to a security bypass vulnerability. Attackers can exploit this issue to bypass security restrictions and perform unauthorized actions. Apple iCloud for Windows is a cloud service based on the Windows platform, which supports storage of music, photos, Apps and contacts, etc. A remote attacker could exploit this vulnerability to track users. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-12-13-3 iCloud for Windows 7.2 iCloud for Windows 7.2 is now available and addresses the following: APNs Server Available for: Windows 7 and later Impact: An attacker in a privileged network position can track a user Description: A privacy issue existed in the use of client certificates. This issue was addressed through a revised protocol. CVE-2017-13864: FURIOUSMAC Team of United States Naval Academy WebKit Available for: Windows 7 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2017-7156: an anonymous researcher CVE-2017-7157: an anonymous researcher CVE-2017-13856: Jeonghoon Shin CVE-2017-13870: an anonymous researcher CVE-2017-13866: an anonymous researcher Installation note: iCloud for Windows 7.2 may be obtained from: https://support.apple.com/HT204283 Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAloxnUIpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEaAFBAA j1labMyPbFVE/pyYnyry4oO7ngi1PbCs0llErrZUYflZ6X2S32WE4y0wT4VPQqxQ Ew4/bzqTCtlcFEt0oeqNFicfuau6ti63+vct+yD7cTPJeA4Gk9U6uPFalmINUOfA X+8z/6L7eONrI4TKBtOMf3B67blOQdFLG3jOIuyHV7v4GWwbLLuZ6meBAhn3Q+K5 MWP79j7UKYJi2qCYOyafyO+WWU1P0h4LSooer4fDkp8jA5c17TylUhWjv4xJvrOD FGerSvQFC+fp+9ehD2UozXN+smQcYKKaHxp2ZIxU+p9KdeXtgW3cZMuU1kMY3A88 QqLLsXKHJF0+y2YMu6/0dZBNNsiATQ42RbCAot7uo1cEgei64jBsxPC2piHqsxSA wU9hjrqPMweRh64oPC8AOlR4NOAndSmUwEEosIibe/++Na8jyMwXYQh3pgilFIY7 6UfO0ZPP4f5ZWDnu0BDMwR8NFwyHn29tJbYqPVJ3/BZ8SrTHfozrJVXJzwmyeyw7 gd3UU6cTu43Z5x2/uenWYZltymptzfV/x1A7TuqpYD5IMjZDZWnBaQ2AkdWDdj3K wTjVzGtk66lo8L+n58eypJNKbgZ+KowEVMNRUh7HjcBeXod6F9u8hyBhkE4vsj63 7bIP0UwSnZ8RFUf+T4xqciQ72grjhlk+3ykt3xs6h4Q= =MPzc -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2017-13864 // JVNDB: JVNDB-2017-011449 // BID: 102192 // VULHUB: VHN-104529 // PACKETSTORM: 145448 // PACKETSTORM: 145449

AFFECTED PRODUCTS

vendor:applemodel:icloudscope:ltversion:7.2

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:12.7.2

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 0.9

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 0.9

vendor:applemodel:itunesscope:eqversion:12.6

Trust: 0.9

vendor:applemodel:itunesscope:eqversion:12.3

Trust: 0.9

vendor:applemodel:icloudscope:ltversion:7.2 (windows 7 or later )

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:for windows 12.7.2 (windows 7 or later )

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:10.0

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:12.2.2

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:12.7.1

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:12.6.3

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:12.4.3

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:12.6.1

Trust: 0.6

vendor:esignalmodel:esignalscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.6.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.5.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.4.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.3.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.3.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.2.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.1.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.1.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.1.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.1.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.1.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.0.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.0.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.1.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:4.2.72

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:7.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.5.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.5.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:12.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.0.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.0.0.163

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6.1.7

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1.42

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.4.1.10

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.4.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.4.0.80

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.3.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2.12

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.1.1.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.1.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

vendor:applemodel:icloudscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:icloudscope:eqversion:7.0

Trust: 0.3

vendor:applemodel:icloudscope:eqversion:6.2.2

Trust: 0.3

vendor:applemodel:icloudscope:eqversion:6.2.1

Trust: 0.3

vendor:applemodel:icloudscope:eqversion:6.2

Trust: 0.3

vendor:applemodel:icloudscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:icloudscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:icloudscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:icloudscope:eqversion:0

Trust: 0.3

vendor:applemodel:itunesscope:neversion:12.7.2

Trust: 0.3

vendor:applemodel:icloudscope:neversion:7.2

Trust: 0.3

sources: BID: 102192 // JVNDB: JVNDB-2017-011449 // CNNVD: CNNVD-201712-591 // NVD: CVE-2017-13864

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-13864
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-13864
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201712-591
value: MEDIUM

Trust: 0.6

VULHUB: VHN-104529
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-13864
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-104529
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-13864
baseSeverity: MEDIUM
baseScore: 5.9
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-104529 // JVNDB: JVNDB-2017-011449 // CNNVD: CNNVD-201712-591 // NVD: CVE-2017-13864

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-104529 // JVNDB: JVNDB-2017-011449 // NVD: CVE-2017-13864

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201712-591

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201712-591

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-011449

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:HT208328url:https://support.apple.com/en-us/HT208328

Trust: 0.8

title:HT208326url:https://support.apple.com/en-us/HT208326

Trust: 0.8

title:HT208328url:https://support.apple.com/ja-jp/HT208328

Trust: 0.8

title:HT208326url:https://support.apple.com/ja-jp/HT208326

Trust: 0.8

title:Apple iCloud for Windows and iTunes for Windows APNs Server Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77149

Trust: 0.6

sources: JVNDB: JVNDB-2017-011449 // CNNVD: CNNVD-201712-591

EXTERNAL IDS

db:NVDid:CVE-2017-13864

Trust: 3.0

db:BIDid:102192

Trust: 2.0

db:SECTRACKid:1040013

Trust: 1.1

db:JVNid:JVNVU98418454

Trust: 0.8

db:JVNDBid:JVNDB-2017-011449

Trust: 0.8

db:CNNVDid:CNNVD-201712-591

Trust: 0.7

db:NSFOCUSid:38421

Trust: 0.6

db:VULHUBid:VHN-104529

Trust: 0.1

db:PACKETSTORMid:145448

Trust: 0.1

db:PACKETSTORMid:145449

Trust: 0.1

sources: VULHUB: VHN-104529 // BID: 102192 // JVNDB: JVNDB-2017-011449 // PACKETSTORM: 145448 // PACKETSTORM: 145449 // CNNVD: CNNVD-201712-591 // NVD: CVE-2017-13864

REFERENCES

url:http://www.securityfocus.com/bid/102192

Trust: 1.7

url:https://support.apple.com/ht208326

Trust: 1.7

url:https://support.apple.com/ht208328

Trust: 1.7

url:http://www.securitytracker.com/id/1040013

Trust: 1.1

url:https://nvd.nist.gov/vuln/detail/cve-2017-13864

Trust: 1.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13864

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98418454/index.html

Trust: 0.8

url:http://www.nsfocus.net/vulndb/38421

Trust: 0.6

url:https://support.apple.com/en-in/ht208326

Trust: 0.3

url:https://www.apple.com/

Trust: 0.3

url:http://www.apple.com/in/icloud/

Trust: 0.3

url:http://www.apple.com/itunes/

Trust: 0.3

url:https://support.apple.com/en-in/ht208328

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2017/dec/msg00005.html

Trust: 0.3

url:https://lists.apple.com/archives/security-announce/2017/dec/msg00006.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2017-13866

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-13856

Trust: 0.2

url:https://support.apple.com/kb/ht201222

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-13870

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-7157

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2017-7156

Trust: 0.2

url:https://support.apple.com/ht204283

Trust: 0.1

url:https://www.apple.com/itunes/download/

Trust: 0.1

sources: VULHUB: VHN-104529 // BID: 102192 // JVNDB: JVNDB-2017-011449 // PACKETSTORM: 145448 // PACKETSTORM: 145449 // CNNVD: CNNVD-201712-591 // NVD: CVE-2017-13864

CREDITS

FURIOUSMAC Team of United States Naval Academy

Trust: 0.9

sources: BID: 102192 // CNNVD: CNNVD-201712-591

SOURCES

db:VULHUBid:VHN-104529
db:BIDid:102192
db:JVNDBid:JVNDB-2017-011449
db:PACKETSTORMid:145448
db:PACKETSTORMid:145449
db:CNNVDid:CNNVD-201712-591
db:NVDid:CVE-2017-13864

LAST UPDATE DATE

2025-04-20T22:02:29.058000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-104529date:2017-12-28T00:00:00
db:BIDid:102192date:2017-12-19T21:01:00
db:JVNDBid:JVNDB-2017-011449date:2018-01-16T00:00:00
db:CNNVDid:CNNVD-201712-591date:2017-12-15T00:00:00
db:NVDid:CVE-2017-13864date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-104529date:2017-12-25T00:00:00
db:BIDid:102192date:2017-12-13T00:00:00
db:JVNDBid:JVNDB-2017-011449date:2018-01-16T00:00:00
db:PACKETSTORMid:145448date:2017-12-16T02:33:33
db:PACKETSTORMid:145449date:2017-12-16T03:33:33
db:CNNVDid:CNNVD-201712-591date:2017-12-15T00:00:00
db:NVDid:CVE-2017-13864date:2017-12-25T21:29:14.217