ID

VAR-201904-0526


CVE

CVE-2017-13911


TITLE

plural macOS Vulnerability related to input validation in products

Trust: 0.8

sources: JVNDB: JVNDB-2017-014419

DESCRIPTION

A configuration issue was addressed with additional restrictions. This issue affected versions prior to macOS X El Capitan 10.11.6 Security Update 2018-002, macOS Sierra 10.12.6 Security Update 2018-002, macOS High Sierra 10.13.2. Apple macOS Sierra, etc. are all products. Apple macOS Sierra is a dedicated operating system developed for Mac computers. are all products of Apple (Apple). Apple macOS High Sierra is a dedicated operating system developed for Mac computers. Apple OS X El Capitan is a dedicated operating system developed for Mac computers. The vulnerability stems from the existence of unreasonable files in the use of network systems or components configuration, parameter configuration, etc

Trust: 1.71

sources: NVD: CVE-2017-13911 // JVNDB: JVNDB-2017-014419 // VULHUB: VHN-104581

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:ltversion:10.12.6

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.13.2

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.13

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.12

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.11.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.11.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.12.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.13.1

Trust: 0.8

sources: JVNDB: JVNDB-2017-014419 // NVD: CVE-2017-13911

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-13911
value: HIGH

Trust: 1.0

NVD: CVE-2017-13911
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201904-120
value: HIGH

Trust: 0.6

VULHUB: VHN-104581
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-13911
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-104581
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-13911
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-104581 // JVNDB: JVNDB-2017-014419 // CNNVD: CNNVD-201904-120 // NVD: CVE-2017-13911

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-104581 // JVNDB: JVNDB-2017-014419 // NVD: CVE-2017-13911

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201904-120

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201904-120

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-014419

PATCH

title:HT208331url:https://support.apple.com/en-us/HT208331

Trust: 0.8

title:HT208692url:https://support.apple.com/en-us/HT208692

Trust: 0.8

title:HT208692url:https://support.apple.com/ja-jp/HT208692

Trust: 0.8

title:HT208331url:https://support.apple.com/ja-jp/HT208331

Trust: 0.8

title:Apple macOS High Sierra , OS X El Capitan and macOS Sierra SIP Fixes for component configuration error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91043

Trust: 0.6

sources: JVNDB: JVNDB-2017-014419 // CNNVD: CNNVD-201904-120

EXTERNAL IDS

db:NVDid:CVE-2017-13911

Trust: 2.5

db:JVNid:JVNVU92378299

Trust: 0.8

db:JVNid:JVNVU98418454

Trust: 0.8

db:JVNDBid:JVNDB-2017-014419

Trust: 0.8

db:CNNVDid:CNNVD-201904-120

Trust: 0.7

db:VULHUBid:VHN-104581

Trust: 0.1

sources: VULHUB: VHN-104581 // JVNDB: JVNDB-2017-014419 // CNNVD: CNNVD-201904-120 // NVD: CVE-2017-13911

REFERENCES

url:https://support.apple.com/kb/ht208331

Trust: 1.7

url:https://support.apple.com/kb/ht208692

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-13911

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-13911

Trust: 0.8

url:http://jvn.jp/vu/jvnvu92378299/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98418454/index.html

Trust: 0.8

sources: VULHUB: VHN-104581 // JVNDB: JVNDB-2017-014419 // CNNVD: CNNVD-201904-120 // NVD: CVE-2017-13911

SOURCES

db:VULHUBid:VHN-104581
db:JVNDBid:JVNDB-2017-014419
db:CNNVDid:CNNVD-201904-120
db:NVDid:CVE-2017-13911

LAST UPDATE DATE

2024-11-23T19:37:55.578000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-104581date:2019-04-04T00:00:00
db:JVNDBid:JVNDB-2017-014419date:2019-05-09T00:00:00
db:CNNVDid:CNNVD-201904-120date:2019-04-08T00:00:00
db:NVDid:CVE-2017-13911date:2024-11-21T03:11:53.193

SOURCES RELEASE DATE

db:VULHUBid:VHN-104581date:2019-04-03T00:00:00
db:JVNDBid:JVNDB-2017-014419date:2019-05-09T00:00:00
db:CNNVDid:CNNVD-201904-120date:2019-04-03T00:00:00
db:NVDid:CVE-2017-13911date:2019-04-03T18:29:00.313