{"api_version":"1","generated_at":"2026-05-04T13:59:55+00:00","cve":"CVE-2017-2446","urls":{"html":"https://cve.report/CVE-2017-2446","api":"https://cve.report/api/cve/CVE-2017-2446.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-2446","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-2446"},"summary":{"title":"CVE-2017-2446","description":"An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages the mishandling of strict mode functions.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2017-04-02 01:59:00","updated_at":"2019-10-03 00:03:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://support.apple.com/HT207617","name":"https://support.apple.com/HT207617","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of iOS 10.3 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/97130","name":"97130","refsource":"BID","tags":["Third Party Advisory","VDB Entry"],"title":"WebKit Multiple Security Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://security.gentoo.org/glsa/201706-15","name":"GLSA-201706-15","refsource":"GENTOO","tags":[],"title":"WebKitGTK+: Multiple vulnerabilities (GLSA 201706-15) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/41741/","name":"41741","refsource":"EXPLOIT-DB","tags":[],"title":"Apple Safari - 'DateTimeFormat.format' Type Confusion - Multiple dos Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT207601","name":"https://support.apple.com/HT207601","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of tvOS 10.2 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/","name":"https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/","refsource":"MISC","tags":[],"title":"CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1038137","name":"1038137","refsource":"SECTRACK","tags":[],"title":"Apple Safari Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information, Conduct Cross-Site Scripting Attacks, Bypass Security, Deny Service, and Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/41742/","name":"41742","refsource":"EXPLOIT-DB","tags":[],"title":"Apple Safari - Builtin JavaScript Allows Function.caller to be Used in Strict Mode - Multiple dos Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1032","name":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1032","refsource":"MISC","tags":[],"title":"1032 - \n \n \n project-zero -\n \n \n Project Zero - \n \n Monorail","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/HT207600","name":"https://support.apple.com/HT207600","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"About the security content of Safari 10.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-2446","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2446","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"2446","vulnerable":"1","versionEndIncluding":"10.2.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"2446","vulnerable":"1","versionEndIncluding":"10.0.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"2446","vulnerable":"1","versionEndIncluding":"10.1.1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2017-2446","qid":"710506","title":"Gentoo Linux WebKitGTK+ Multiple Vulnerabilities (GLSA 201706-15)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"product-security@apple.com","ID":"CVE-2017-2446","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages the mishandling of strict mode functions."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1032","refsource":"MISC","url":"https://bugs.chromium.org/p/project-zero/issues/detail?id=1032"},{"name":"41741","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/41741/"},{"name":"1038137","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1038137"},{"name":"41742","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/41742/"},{"name":"https://support.apple.com/HT207601","refsource":"CONFIRM","url":"https://support.apple.com/HT207601"},{"name":"97130","refsource":"BID","url":"http://www.securityfocus.com/bid/97130"},{"name":"GLSA-201706-15","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201706-15"},{"name":"https://support.apple.com/HT207600","refsource":"CONFIRM","url":"https://support.apple.com/HT207600"},{"name":"https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/","refsource":"MISC","url":"https://doar-e.github.io/blog/2018/07/14/cve-2017-2446-or-jscjsglobalobjectishavingabadtime/"},{"name":"https://support.apple.com/HT207617","refsource":"CONFIRM","url":"https://support.apple.com/HT207617"}]}},"nvd":{"publishedDate":"2017-04-02 01:59:00","lastModifiedDate":"2019-10-03 00:03:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*","versionEndIncluding":"10.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndIncluding":"10.2.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndIncluding":"10.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"2446","Ordinal":"98585","Title":"CVE-2017-2446","CVE":"CVE-2017-2446","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"2446","Ordinal":"1","NoteData":"An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the \"WebKit\" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages the mishandling of strict mode functions.","Type":"Description","Title":null},{"CveYear":"2017","CveId":"2446","Ordinal":"2","NoteData":"2017-04-01","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"2446","Ordinal":"3","NoteData":"2018-07-18","Type":"Other","Title":"Modified"}]}}}