5.5
CVSSv3

CVE-2017-13869

Published: 25/12/2017 Updated: 08/03/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

An issue exists in certain Apple products. iOS prior to 11.2 is affected. macOS prior to 10.13.2 is affected. tvOS prior to 11.2 is affected. watchOS prior to 4.2 is affected. The issue involves the "Kernel" component. It allows malicious users to bypass intended memory-read restrictions via a crafted app.

Vulnerable Product Search on Vulmon Subscribe to Product

apple tvos

apple mac os x

apple iphone os

apple watchos

Exploits

/* Source: bugschromiumorg/p/project-zero/issues/detail?id=1405 For 64-bit processes, the getrusage() syscall handler converts a `struct rusage` to a `struct user64_rusage` using `munge_user64_rusage()`, then copies the `struct user64_rusage` to userspace: int getrusage(struct proc *p, struct getrusage_args *uap, __unused int32_t *retva ...
macOS suffers from a getrusage stack leak through struct padding ...