6.8
CVSSv2

CVE-2017-7047

Published: 20/07/2017 Updated: 25/03/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 686
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in certain Apple products. iOS prior to 10.3.3 is affected. macOS prior to 10.12.6 is affected. tvOS prior to 10.2.2 is affected. watchOS prior to 3.2.3 is affected. The issue involves the "libxpc" component. It allows malicious users to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x

apple watchos

apple iphone os

apple tvos

Exploits

Source: bugschromiumorg/p/project-zero/issues/detail?id=1247 When XPC serializes large xpc_data objects it creates mach memory entry ports to represent the memory region then transfers that region to the receiving process by sending a send right to the memory entry port in the underlying mach message By crafting our own xpc message (or ...

Github Repositories

Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047)

Triple-Fetch-Kernel-Creds Attempt to steal kernelcredentials from launchd + task_t pointer (Based on: CVE-2017-7047) About Triple Fetch (by Ian Beer from Google Project Zero) Triple Fetch is an exploit for iOS devices prior to iOS 1033 It exploits a logic error in libxpc that allows attackers to send malious messages with xpc_data objects that are backed by shared memory Wha

triple_fetch - ianbeer This is an exploit for CVE-2017-7047, a logic error in libxpc which allowed malicious message senders to send xpc_data objects that were backed by shared memory Consumers of xpc messages did not seem to expect that the backing buffers of xpc_data objects could be modified by the sender whilst being processed by the receiver This project exploits CVE-201

蒸米的文章(iOS冰与火之歌系列,一步一步学ROP系列,安卓动态调试七种武器系列等)

MyArticles 作者微博:蒸米spark wwwweibocom/zhengmin1989 Twitter: SparkZheng twittercom/SparkZheng 蒸米的部分文章(iOS冰与火之歌系列,一步一步学ROP系列,安卓动态调试七种武器系列等), 请下载下来后用浏览器阅读: eu-18-Zheng-Eternal-War-in-XNU-Kernel-Objects eu-18-Bai-The-Last-Line-Of-Defense-Understanding-An