Vulnerability Details : CVE-2017-2372
An issue was discovered in certain Apple products. GarageBand before 10.1.5 is affected. Logic Pro X before 10.3 is affected. The issue involves the "Projects" component, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted GarageBand project file.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Products affected by CVE-2017-2372
- cpe:2.3:a:apple:garageband:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:logic_pro_x:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-2372
1.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-2372
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2017-2372
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-2372
-
https://support.apple.com/HT207477
About the security content of GarageBand 10.1.5 - Apple SupportVendor Advisory
-
http://www.talosintelligence.com/reports/TALOS-2016-0262/
Talos Website
-
https://support.apple.com/HT207476
About the security content of Logic Pro X 10.3 - Apple SupportVendor Advisory
-
http://www.securitytracker.com/id/1037627
Apple GarageBand Project File Memory Corruption Error Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.securityfocus.com/bid/95627
Apple Logic Pro X and GarageBand CVE-2017-2372 Memory Corruption VulnerabilityThird Party Advisory;VDB Entry
Jump to