Description
Multiple vulnerabilities were found in Apple iCloud. Malicious users can exploit these vulnerabilities to execute arbitrary code, perform cross-site scripting attack, obtain sensitive information, bypass security restrictions and gain privileges.
Below is a complete list of vulnerabilities:
- A type confusion vulnerability in WebKit can be exploited remotely to execute arbitrary code;
- Multiple memory corruption vulnerabilities can be exploited remotely to execute arbitrary code;
- Multiple logic vulnerabilities in WebKit can be exploited remotely to perform cross-site scripting attack;
- A validation vulnerability in WebKit can be exploited remotely to obtain sensitive information;
- A memory corruption vulnerability can be exploited loccaly to bypass security restrictions;
- A buffer overflow vulnerability in CoreCrypto can be exploited locally to elevate privileges;
- A race condition vulnerability can be exploited locally to execute code execution;
- A cross-origin vulnerability in WebKit can be exploited locally to obtain sensitive information;
Original advisories
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2019-7285 critical
- CVE-2019-6201 critical
- CVE-2019-8506 critical
- CVE-2019-8518 critical
- CVE-2019-8563 high
- CVE-2019-8544 critical
- CVE-2019-8551 warning
- CVE-2019-8535 critical
- CVE-2019-8523 critical
- CVE-2019-8559 high
- CVE-2019-8558 high
- CVE-2019-8503 critical
- CVE-2019-8556 high
- CVE-2019-7292 warning
- CVE-2019-8524 high
- CVE-2019-8536 critical
- CVE-2019-8542 high
- CVE-2019-8515 warning
- CVE-2019-6232 critical
- CVE-2019-6236 critical
- CVE-2019-8639 high
- CVE-2019-8638 high
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!