Descripción
Multiple serious vulnerabilities have been found in Apple iTunes. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface and obtain sensitive information.
Below is a complete list of vulnerabilities:
- An out-of-bounds read vulnerability in CoreGraphics can be exploited remotely via specially crafted website to execute arbitrary code;
- Unspecified vulnerabilities can be exploited locally to obtain sensitive information;
- A race condition vulnerability in WebKit can be exploited remotely via specially crafted website to execute arbitrary code;
- A type confussion vulnerability in WebKit can be exploited remotely via specially crafted website to execute arbitrary code;
- Multiple memory corruption vulnerabilities in WebKit can be exploited remotely via specially crafted website to execute arbitrary code;
- An unspecified vulnerability in WebKit can be exploited remotely via specially crafted website to spoof user interface;
- A buffer overflow vulnerability in WebKit can be exploited remotely via specially crafted website to execute arbitrary code;
- An unspecified vulnerability in WebKit can be exploited remotely via specially crafted website to obtain sensitive information;
- An out-of-bounds read vulnerability in WebKit can be exploited remotely via specially crafted website to execute arbitrary code.
Notas informativas originales
Explotación
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
Lista CVE
- CVE-2018-4194 critical
- CVE-2018-4218 critical
- CVE-2018-4246 critical
- CVE-2018-4222 critical
- CVE-2018-4224 high
- CVE-2018-4225 high
- CVE-2018-4226 high
- CVE-2018-4232 warning
- CVE-2018-4233 critical
- CVE-2018-4188 high
- CVE-2018-4190 critical
- CVE-2018-4192 critical
- CVE-2018-4199 critical
- CVE-2018-4200 critical
- CVE-2018-4201 critical
- CVE-2018-4204 critical
- CVE-2018-4214 critical
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!