SB2018100903 - Multiple vulnerabilities in Apple iCloud
Published: October 9, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 19 secuirty vulnerabilities.
1) Use-after-free error (CVE-ID: CVE-2018-4197)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to use-after-free when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
2) Use-after-free error (CVE-ID: CVE-2018-4306)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to use-after-free when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
3) Use-after-free error (CVE-ID: CVE-2018-4312)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to use-after-free when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
4) Use-after-free error (CVE-ID: CVE-2018-4314)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to use-after-free when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
5) Use-after-free error (CVE-ID: CVE-2018-4315)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to use-after-free when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
6) Use-after-free error (CVE-ID: CVE-2018-4317)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to use-after-free when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
7) Use-after-free error (CVE-ID: CVE-2018-4318)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to use-after-free when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
8) Memory corruption (CVE-ID: CVE-2018-4299)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
9) Memory corruption (CVE-ID: CVE-2018-4323)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
10) Memory corruption (CVE-ID: CVE-2018-4328)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
11) Memory corruption (CVE-ID: CVE-2018-4358)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
12) Memory corruption (CVE-ID: CVE-2018-4359)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
13) Memory corruption (CVE-ID: CVE-2018-4316)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists in WebKit component due to boundary error when handling malicious input. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.
14) Assertion failure (CVE-ID: CVE-2018-4191)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in WebKit component due to boundary error when handling malicious input. A remote attacker can supply specially crafted input, trigger assertion failure and cause the service to crash.
15) Assertion failure (CVE-ID: CVE-2018-4361)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in WebKit component due to boundary error when handling malicious input. A remote attacker can supply specially crafted input, trigger assertion failure and cause the service to crash.
16) Cross-site scripting (CVE-ID: CVE-2018-4345)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists in WebKit component due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
17) Cross-site scripting (CVE-ID: CVE-2018-4309)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists in WebKit component due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
18) Cross-origin policy bypass (CVE-ID: CVE-2018-4319)
The disclosed vulnerability allows a remote attacker to bypass cross-origin policy on the target system.
The vulnerability exists in WebKit component due to unexepected cross-origin behavior when handling user-supplied data. A remote attacker can trick the victim into visiting a specially crafted website and bypass cross-origin policy with "iframe" elements.
19) Cross-origin policy bypass (CVE-ID: CVE-2018-4311)
The disclosed vulnerability allows a remote attacker to bypass cross-origin policy on the target system.
The vulnerability exists in WebKit component due to cross-origin SecurityErrors includes the accessed frame’s origin. A remote attacker can trick the victim into visiting a specially crafted website and bypass cross-origin policy.
Remediation
Install update from vendor's website.