Vulnerabilities > CVE-2017-13875 - Out-of-bounds Read vulnerability in Apple mac OS X
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
An issue was discovered in certain Apple products. macOS before 10.13.2 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (out-of-bounds read) via a crafted app.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Overread Buffers An adversary attacks a target by providing input that causes an application to read beyond the boundary of a defined buffer. This typically occurs when a value influencing where to start or stop reading is set to reflect positions outside of the valid memory location of the buffer. This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.
Exploit-Db
description | macOS - Kernel Code Execution due to Lack of Bounds Checking in AppleIntelCapriController::GetLinkConfig. CVE-2017-13875. Dos exploit for macOS platform |
file | exploits/macos/dos/43327.c |
id | EDB-ID:43327 |
last seen | 2017-12-12 |
modified | 2017-12-12 |
platform | macos |
port | |
published | 2017-12-12 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/43327/ |
title | macOS - Kernel Code Execution due to Lack of Bounds Checking in AppleIntelCapriController::GetLinkConfig |
type | dos |
Nessus
NASL family | MacOS X Local Security Checks |
NASL id | MACOS_10_13_2.NASL |
description | The remote host is running a version of Mac OS X that is 10.13.x prior to 10.13.2. It is, therefore, affected by multiple vulnerabilities in the following components : - apache - curl - Directory Utility - IOAcceleratorFamily - IOKit - Intel Graphics Driver - Kernel - Mail - Mail Drafts - OpenSSL - Screen Sharing Server Note that successful exploitation of the most serious issues can result in arbitrary code execution. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 105080 |
published | 2017-12-07 |
reporter | This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/105080 |
title | macOS 10.13.x < 10.13.2 Multiple Vulnerabilities (Meltdown) |
code |
|
Seebug
bulletinFamily | exploit |
description | AppleIntelCapriController::GetLinkConfig trusts a user-supplied value in the structure input which it uses to index a small table of pointers without bounds checking. The OOB-read pointer is passed to AppleIntelFramebuffer::validateDisplayMode which will read a pointer to a C++ object from that buffer (at offset 2138h) and call a virtual method allowing trivial kernel code execution. Tested on MacOS 10.13 (17A365) on MacBookAir5,2 |
id | SSV:96987 |
last seen | 2017-12-25 |
modified | 2017-12-15 |
published | 2017-12-15 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-96987 |
title | MacOS kernel code execution due to lack of bounds checking in AppleIntelCapriController::GetLinkConfig(CVE-2017-13875) |
References
- http://www.securityfocus.com/bid/102099
- http://www.securityfocus.com/bid/102099
- http://www.securitytracker.com/id/1039966
- http://www.securitytracker.com/id/1039966
- https://support.apple.com/HT208331
- https://support.apple.com/HT208331
- https://www.exploit-db.com/exploits/43327/
- https://www.exploit-db.com/exploits/43327/