CVE-2024-27873
Summary
| CVE | CVE-2024-27873 |
|---|---|
| State | PUBLISHED |
| Assigner | apple |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2024-07-29 23:15:10 UTC |
| Updated | 2026-04-02 19:17:36 UTC |
| Description | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, iOS 17.6 and iPadOS 17.6, macOS Monterey 12.7.6, macOS Sonoma 14.6, macOS Ventura 13.6.8. Processing a maliciously crafted video file may lead to unexpected app termination. |
Risk And Classification
Primary CVSS: v3.1 5.5 MEDIUM from [email protected]
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Problem Types: CWE-787 | Processing a maliciously crafted video file may lead to unexpected app termination | CWE-787 CWE-787 Out-of-bounds Write
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
| 3.1 | ADP | DECLARED | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 5.5 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
CVSS v3.1 Breakdown
Attack Vector
LocalAttack Complexity
LowPrivileges Required
NoneUser Interaction
RequiredScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Apple | IOS And IPadOS | affected 16.7.9 custom | Not specified |
| CNA | Apple | IOS And IPadOS | affected 17.6 custom | Not specified |
| CNA | Apple | MacOS | affected 12.7.6 custom | Not specified |
| CNA | Apple | MacOS | affected 13.6.8 custom | Not specified |
| CNA | Apple | MacOS | affected 14.6 custom | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| support.apple.com/en-us/120912 | [email protected] | support.apple.com | |
| support.apple.com/en-us/HT214116 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Release Notes, Vendor Advisory |
| support.apple.com/en-us/120909 | [email protected] | support.apple.com | |
| support.apple.com/en-us/120910 | [email protected] | support.apple.com | |
| seclists.org/fulldisclosure/2024/Jul/16 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| support.apple.com/en-us/HT214117 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Release Notes, Vendor Advisory |
| support.apple.com/kb/HT214120 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| seclists.org/fulldisclosure/2024/Jul/17 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| support.apple.com/kb/HT214118 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| support.apple.com/kb/HT214117 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| support.apple.com/en-us/HT214119 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Release Notes, Vendor Advisory |
| support.apple.com/en-us/HT214120 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Release Notes, Vendor Advisory |
| seclists.org/fulldisclosure/2024/Jul/20 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| seclists.org/fulldisclosure/2024/Jul/18 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| support.apple.com/kb/HT214119 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| support.apple.com/en-us/HT214118 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Release Notes, Vendor Advisory |
| support.apple.com/en-us/120911 | [email protected] | support.apple.com | |
| seclists.org/fulldisclosure/2024/Jul/19 | af854a3a-2127-422b-91ae-364da2661108 | seclists.org | Mailing List, Third Party Advisory |
| support.apple.com/en-us/120908 | [email protected] | support.apple.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.