Vulnerability Details : CVE-2017-2533
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "DiskArbitration" component. A race condition allows attackers to execute arbitrary code in a privileged context via a crafted app.
Vulnerability category: Execute code
Products affected by CVE-2017-2533
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-2533
0.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 60 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-2533
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST | |
7.0
|
HIGH | CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.0
|
5.9
|
NIST |
CWE ids for CVE-2017-2533
-
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-2533
-
https://phoenhex.re/2017-06-09/pwn2own-diskarbitrationd-privesc
Pwn2Own: Safari sandbox part 1 – Mount yourself a root shell - phoenhex team
-
https://support.apple.com/HT207797
About the security content of macOS Sierra 10.12.5, Security Update 2017-002 El Capitan, and Security Update 2017-002 Yosemite - Apple SupportVendor Advisory
-
https://www.exploit-db.com/exploits/42146/
Apple macOS - Disk Arbitration Daemon Race Condition
-
http://www.securitytracker.com/id/1038484
Apple macOS/OS X Multiple Flaws Let Remote Users Execute Arbitrary Code and Obtain Authentication Credentials and Let Local Users Obtain Potentially Sensitive Information and Gain Elevated Privileges
-
http://www.zerodayinitiative.com/advisories/ZDI-17-357/
ZDI-17-357 | Zero Day Initiative
Jump to