Description
Multiple vulnerabilities were found in Apple iTunes. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code.
Below is a complete list of vulnerabilities:
- Multiple vulnerabilities can be exploited remotely to spoof user interface;
- Multiple memory corruption vulnerabilities can be exploited remotely to execute arbitrary code;
Original advisories
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2018-4440 warning
- CVE-2018-4439 warning
- CVE-2018-4437 high
- CVE-2018-4464 high
- CVE-2018-4441 high
- CVE-2018-4442 high
- CVE-2018-4443 high
- CVE-2018-4438 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!