Description
Multiple serious vulnerabilities have been found in Apple iTunes. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface and obtain sensitive information.
Below is a complete list of vulnerabilities:
- An out-of-bounds read vulnerability in CoreGraphics can be exploited remotely via specially crafted website to execute arbitrary code;
- Unspecified vulnerabilities can be exploited locally to obtain sensitive information;
- A race condition vulnerability in WebKit can be exploited remotely via specially crafted website to execute arbitrary code;
- A type confussion vulnerability in WebKit can be exploited remotely via specially crafted website to execute arbitrary code;
- Multiple memory corruption vulnerabilities in WebKit can be exploited remotely via specially crafted website to execute arbitrary code;
- An unspecified vulnerability in WebKit can be exploited remotely via specially crafted website to spoof user interface;
- A buffer overflow vulnerability in WebKit can be exploited remotely via specially crafted website to execute arbitrary code;
- An unspecified vulnerability in WebKit can be exploited remotely via specially crafted website to obtain sensitive information;
- An out-of-bounds read vulnerability in WebKit can be exploited remotely via specially crafted website to execute arbitrary code.
Fiches de renseignement originales
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
Liste CVE
- CVE-2018-4194 critical
- CVE-2018-4218 critical
- CVE-2018-4246 critical
- CVE-2018-4222 critical
- CVE-2018-4224 high
- CVE-2018-4225 high
- CVE-2018-4226 high
- CVE-2018-4232 warning
- CVE-2018-4233 critical
- CVE-2018-4188 high
- CVE-2018-4190 critical
- CVE-2018-4192 critical
- CVE-2018-4199 critical
- CVE-2018-4200 critical
- CVE-2018-4201 critical
- CVE-2018-4204 critical
- CVE-2018-4214 critical
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !