Action not permitted
Modal body text goes here.
CVE-2018-4392
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
product-security@apple.com | https://support.apple.com/kb/HT209192 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/kb/HT209194 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/kb/HT209195 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/kb/HT209196 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/kb/HT209197 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/kb/HT209198 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | iOS, tvOS, watchOS, Safari, iTunes for Windows, iCloud for Windows |
Version: Versions prior to: iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:11:22.679Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT209192" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT209195" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT209194" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT209197" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT209198" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/kb/HT209196" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "iOS, tvOS, watchOS, Safari, iTunes for Windows, iCloud for Windows", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Versions prior to: iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8" } ] } ], "descriptions": [ { "lang": "en", "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8." } ], "problemTypes": [ { "descriptions": [ { "description": "Processing maliciously crafted web content may lead to arbitrary code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-03T17:43:17", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT209192" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT209195" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT209194" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT209197" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT209198" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/kb/HT209196" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2018-4392", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iOS, tvOS, watchOS, Safari, iTunes for Windows, iCloud for Windows", "version": { "version_data": [ { "version_value": "Versions prior to: iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing maliciously crafted web content may lead to arbitrary code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/kb/HT209192", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209192" }, { "name": "https://support.apple.com/kb/HT209195", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209195" }, { "name": "https://support.apple.com/kb/HT209194", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209194" }, { "name": "https://support.apple.com/kb/HT209197", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209197" }, { "name": "https://support.apple.com/kb/HT209198", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209198" }, { "name": "https://support.apple.com/kb/HT209196", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209196" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2018-4392", "datePublished": "2019-04-03T17:43:17", "dateReserved": "2018-01-02T00:00:00", "dateUpdated": "2024-08-05T05:11:22.679Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-4392\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2019-04-03T18:29:12.563\",\"lastModified\":\"2019-04-05T16:12:19.880\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.\"},{\"lang\":\"es\",\"value\":\"Se abordaron m\u00faltiples problemas de corrupci\u00f3n de memoria con una gesti\u00f3n de memoria mejorada. El problema afectaba a iOS en versiones anteriores a la 12.1, tvOS en versiones anteriores a la 12.1, watchOS en versiones anteriores a la 5.1, Safari en versiones anteriores a la 12.0.1, iTunes en versiones anteriores a la 12.9.1 y iCloud para Windows en versiones anteriores a la 7.8.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.0.1\",\"matchCriteriaId\":\"C81D36CE-BDD8-4A4E-A384-C01436D796D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.1\",\"matchCriteriaId\":\"1FDA8399-DFA9-41CA-BB94-A5419A9518EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.1\",\"matchCriteriaId\":\"0B534B9B-7B04-4047-B9B7-C5B516123D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.1\",\"matchCriteriaId\":\"D5F3D21F-0519-448D-82CD-0F789FBA4712\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"7.8\",\"matchCriteriaId\":\"EF8B2326-7AA3-4D36-AB6E-E3E81C86F4EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.9.1\",\"matchCriteriaId\":\"0D398FB7-140F-40F5-AF33-AB0A919A2F8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/kb/HT209192\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT209194\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT209195\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT209196\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT209197\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT209198\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ghsa-v4j8-g3j4-9v98
Vulnerability from github
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.
{ "affected": [], "aliases": [ "CVE-2018-4392" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-04-03T18:29:00Z", "severity": "HIGH" }, "details": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.", "id": "GHSA-v4j8-g3j4-9v98", "modified": "2022-05-14T01:11:55Z", "published": "2022-05-14T01:11:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-4392" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT209192" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT209194" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT209195" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT209196" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT209197" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT209198" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201904-1444
Vulnerability from variot
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8. plural Apple There are multiple memory corruption vulnerabilities in the product due to flaws in memory handling.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system. WebKit is one of the web browser engine components. A buffer error vulnerability exists in the WebKit component of several Apple products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
Alternatively, on your watch, select "My Watch > General > About". CVE-2018-4378: an anonymous researcher, zhunki of 360 ESG Codesafe Team
Installation note:
Safari 12.0.1 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2018-10-30-1 iOS 12.1
iOS 12.1 is now available and addresses the following:
AppleAVD Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing malicious video via FaceTime may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4384: Natalie Silvanovich of Google Project Zero
Contacts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted vcf file may lead to a denial of service Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4365: an anonymous researcher
CoreCrypto Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker may be able to exploit a weakness in the Miller-Rabin primality test to incorrectly identify prime numbers Description: An issue existed in the method for determining prime numbers. CVE-2018-4398: Martin Albrecht, Jake Massimo and Kenny Paterson of Royal Holloway, University of London, and Juraj Somorovsky of Ruhr University, Bochum
FaceTime Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to leak memory Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4366: Natalie Silvanovich of Google Project Zero
FaceTime Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4367: Natalie Silvanovich of Google Project Zero
Graphics Driver Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4384: Natalie Silvanovich of Google Project Zero
ICU Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted string may lead to heap corruption Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4394: an anonymous researcher
IOHIDFamily Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4427: Pangu Team
IPSec Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to gain elevated privileges Description: An out-of-bounds read was addressed with improved input validation. CVE-2018-4371: Tim Michaud (@TimGMichaud) of Leviathan Security Group
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed by removing the vulnerable code. CVE-2018-4420: Mohamed Ghannam (@_simo36)
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2018-4413: Juwei Lin (@panicaII) of TrendMicro Mobile Security Team
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4419: Mohamed Ghannam (@_simo36)
Messages Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted text message may lead to UI spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2018-4390: Rayyan Bijoora (@Bijoora) of The City School, PAF Chapter CVE-2018-4391: Rayyan Bijoora (@Bijoora) of The City School, PAF Chapter
NetworkExtension Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Connecting to a VPN server may leak DNS queries to a DNS proxy Description: A logic issue was addressed with improved state management. CVE-2018-4369: an anonymous researcher
Notes Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local attacker may be able to share items from the lock screen Description: A lock screen issue allowed access to the share function on a locked device. This issue was addressed by restricting options offered on a locked device. CVE-2018-4388: videosdebarraquito
Safari Reader Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Enabling the Safari Reader feature on a maliciously crafted webpage may lead to universal cross site scripting Description: A logic issue was addressed with improved validation. CVE-2018-4374: Ryan Pickren (ryanpickren.com)
Safari Reader Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Enabling the Safari Reader feature on a maliciously crafted webpage may lead to universal cross site scripting Description: A cross-site scripting issue existed in Safari. CVE-2018-4377: Ryan Pickren (ryanpickren.com)
Security Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted S/MIME signed message may lead to a denial of service Description: A validation issue was addressed with improved logic. CVE-2018-4400: Yukinobu Nagayasu of LAC Co., Ltd.
VoiceOver Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local attacker may be able to view photos from the lock screen Description: A lock screen issue allowed access to photos via Reply With Message on a locked device. CVE-2018-4387: videosdebarraquito
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Visiting a malicious website may lead to address bar spoofing Description: A logic issue was addressed with improved state management. CVE-2018-4385: an anonymous researcher
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2018-4409: Sabri Haddouche (@pwnsdx) of Wire Swiss GmbH
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to code execution Description: A memory corruption issue was addressed with improved validation. CVE-2018-4378: an anonymous researcher, zhunki of 360 ESG Codesafe Team
WiFi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2018-4368: Milan Stute and Alex Mariotto of Secure Mobile Networking Lab at Technische UniversitA$?t Darmstadt
Additional recognition
Certificate Signing We would like to acknowledge YiAit Can YILMAZ (@yilmazcanyigit) for their assistance.
iBooks We would like to acknowledge Sem VoigtlA$?nder of Fontys Hogeschool ICT for their assistance.
Security We would like to acknowledge Marinos Bernitsas of Parachute for their assistance.
Installation note:
This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. The version after applying this update will be "iOS 12.1".
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgUpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3HpTw/7 Bkh9bUEddgGUejpnjO1DRiBlHUDQMssF7nG2LM5JOcCDoLkeHSdcr86KnR7VEyYp qSllLijO9ZzrLtJuZSEelDCi+eL1Ojk3kP/6ZeMRIxDkYItR7EFWQUK71wcInk5k qPZp2FnKU3qx0Ax7wzQi3GTQk8CZCVWcuCzh0UA0Nc3rgk0bf29+7AKmgiTaT2Ra Yo4bRIXRuyi+jE39hN4x41vwjSbaxr5EZb9rvL5HT6Idipcoc9aS+sDbsscXjz/5 9WHlwAB5mxeqO3vY5WNlLhOUXXqMVRfPC/qxQocl86r2AE9jJedQFl/p9qpG59we FrAejzKTU+1GpI4dGY6puAJval5DlcedWBxsyBxFAT04HdY0pfgF4zpFDTHRj6no HnEvtF+pNgqX2OTTLCXtMG4r5c7b1yrOPYkM6FS+BjLV2H0X9n3PpvX0qvAqSTn3 RGbkJqHFV4G/DwsWUQQOOXNCthEwhzbT2n7mc+rCtN1WPUu99fGGZusMAqetmVvl hgUIVPp9+ZHs64BlTzD+xu8e6jyoJ8YoPD9a/r+ENXxHJz6Mr8Jd/E2ZesN5tWpi sO3ajUx/d158T4jfAvIE8tJGungUgehPVIIR5120nYxHc6gMUAYzirwFptfvSpb8 HWzMnE69KcP9Lnhtgp7fRv+HKpJmrsjOLKyldZzjZlA= =cetI -----END PGP SIGNATURE----- . ------------------------------------------------------------------------ WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0008
Date reported : November 21, 2018 Advisory ID : WSA-2018-0008 WebKitGTK+ Advisory URL : https://webkitgtk.org/security/WSA-2018-0008.html WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2018-0008.html CVE identifiers : CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4378, CVE-2018-4382, CVE-2018-4386, CVE-2018-4392, CVE-2018-4416.
Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit.
CVE-2018-4345 Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before 2.22.1. Credit to an anonymous researcher. A cross-site scripting issue existed in WebKit. This issue was addressed with improved URL validation.
CVE-2018-4372 Versions affected: WebKitGTK+ before 2.22.4 and WPE WebKit before 2.22.2. Credit to HyungSeok Han, DongHyeon Oh, and Sang Kil Cha of KAIST Softsec Lab, Korea. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2018-4373 Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0. Credit to ngg, alippai, DirtYiCE, KT of Tresorit working with Trend Microys Zero Day Initiative. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2018-4375 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to Yu Haiwan and Wu Hongjun From Nanyang Technological University working with Trend Micro's Zero Day Initiative. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2018-4376 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to 010 working with Trend Micro's Zero Day Initiative. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2018-4378 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to an anonymous researcher, zhunki of 360 ESG Codesafe Team. Processing maliciously crafted web content may lead to code execution.
CVE-2018-4382 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2018-4386 Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before 2.22.1. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2018-4392 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to zhunki of 360 ESG Codesafe Team. Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2018-4416 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution.
We recommend updating to the latest stable versions of WebKitGTK+ and WPE WebKit. It is the best way to ensure that you are running safe versions of WebKit. Please check our websites for information about the latest stable releases.
Further information about WebKitGTK+ and WPE WebKit security advisories can be found at: https://webkitgtk.org/security.html or https://wpewebkit.org/security/.
The WebKitGTK+ and WPE WebKit team, November 21, 2018
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-1444", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tvos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.1" }, { "model": "icloud", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "7.8" }, { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.1" }, { "model": "safari", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.0.1" }, { "model": "itunes", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.9.1" }, { "model": "watchos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "5.1" }, { "model": "icloud", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "for windows 7.8 (windows 7 or later )" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "12.1 (ipad air or later )" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "12.1 (iphone 5s or later )" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "12.1 (ipod touch first 6 generation )" }, { "model": "itunes", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "for windows 12.9.1 (windows 7 or later )" }, { "model": "tvos", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "12.1 (apple tv 4k)" }, { "model": "tvos", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "12.1 (apple tv first 4 generation )" }, { "model": "watchos", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "5.1 (apple watch series 1 or later )" }, { "model": "icloud", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.7" }, { "model": "itunes", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.1.3" }, { "model": "itunes", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.9" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": null }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0b1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0b2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0b1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.3.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.3.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.3.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.0b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.1b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.2b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.3b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.4b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.0b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.1b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.2b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.0b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.1b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.2b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.0b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.7" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.8" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.8" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.8" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.8" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.6" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.6" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.4.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.3.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.3.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.6" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.4.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.1.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.3.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.3.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.4.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.4.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.4.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.4.3" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.4.4" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.2.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.3" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.6" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.3" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.4.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.3" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.3" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.3" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.1" } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-4392" }, { "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "db": "NVD", "id": "CVE-2018-4392" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.0.1", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.8", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.9.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-4392" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple", "sources": [ { "db": "PACKETSTORM", "id": "150106" }, { "db": "PACKETSTORM", "id": "150105" }, { "db": "PACKETSTORM", "id": "150107" }, { "db": "PACKETSTORM", "id": "150109" }, { "db": "PACKETSTORM", "id": "150104" }, { "db": "PACKETSTORM", "id": "150103" } ], "trust": 0.6 }, "cve": "CVE-2018-4392", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2018-4392", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-134423", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-4392", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-4392", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201810-1498", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-134423", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-4392", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-134423" }, { "db": "VULMON", "id": "CVE-2018-4392" }, { "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "db": "CNNVD", "id": "CNNVD-201810-1498" }, { "db": "NVD", "id": "CVE-2018-4392" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8. plural Apple There are multiple memory corruption vulnerabilities in the product due to flaws in memory handling.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system. WebKit is one of the web browser engine components. A buffer error vulnerability exists in the WebKit component of several Apple products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system. \n\nAlternatively, on your watch, select \"My Watch \u003e General \u003e About\". \nCVE-2018-4378: an anonymous researcher, zhunki of 360 ESG Codesafe\nTeam\n\nInstallation note:\n\nSafari 12.0.1 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2018-10-30-1 iOS 12.1\n\niOS 12.1 is now available and addresses the following:\n\nAppleAVD\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing malicious video via FaceTime may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4384: Natalie Silvanovich of Google Project Zero\n\nContacts\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted vcf file may lead to a\ndenial of service\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2018-4365: an anonymous researcher\n\nCoreCrypto\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An attacker may be able to exploit a weakness in the\nMiller-Rabin primality test to incorrectly identify prime numbers\nDescription: An issue existed in the method for determining prime\nnumbers. \nCVE-2018-4398: Martin Albrecht, Jake Massimo and Kenny Paterson of\nRoyal Holloway, University of London, and Juraj Somorovsky of Ruhr\nUniversity, Bochum\n\nFaceTime\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A remote attacker may be able to leak memory\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4366: Natalie Silvanovich of Google Project Zero\n\nFaceTime\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A remote attacker may be able to initiate a FaceTime call\ncausing arbitrary code execution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4367: Natalie Silvanovich of Google Project Zero\n\nGraphics Driver\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A remote attacker may be able to initiate a FaceTime call\ncausing arbitrary code execution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4384: Natalie Silvanovich of Google Project Zero\n\nICU\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted string may lead to heap\ncorruption\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2018-4394: an anonymous researcher\n\nIOHIDFamily\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4427: Pangu Team\n\nIPSec\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to gain elevated privileges\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2018-4371: Tim Michaud (@TimGMichaud) of Leviathan Security Group\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed by removing the\nvulnerable code. \nCVE-2018-4420: Mohamed Ghannam (@_simo36)\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to read restricted memory\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2018-4413: Juwei Lin (@panicaII) of TrendMicro Mobile Security\nTeam\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2018-4419: Mohamed Ghannam (@_simo36)\n\nMessages\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted text message may lead to UI\nspoofing\nDescription: An inconsistent user interface issue was addressed with\nimproved state management. \nCVE-2018-4390: Rayyan Bijoora (@Bijoora) of The City School, PAF\nChapter\nCVE-2018-4391: Rayyan Bijoora (@Bijoora) of The City School, PAF\nChapter\n\nNetworkExtension\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Connecting to a VPN server may leak DNS queries to a DNS\nproxy\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2018-4369: an anonymous researcher\n\nNotes\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A local attacker may be able to share items from the lock\nscreen\nDescription: A lock screen issue allowed access to the share function\non a locked device. This issue was addressed by restricting options\noffered on a locked device. \nCVE-2018-4388: videosdebarraquito\n\nSafari Reader\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Enabling the Safari Reader feature on a maliciously crafted\nwebpage may lead to universal cross site scripting\nDescription: A logic issue was addressed with improved validation. \nCVE-2018-4374: Ryan Pickren (ryanpickren.com)\n\nSafari Reader\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Enabling the Safari Reader feature on a maliciously crafted\nwebpage may lead to universal cross site scripting\nDescription: A cross-site scripting issue existed in Safari. \nCVE-2018-4377: Ryan Pickren (ryanpickren.com)\n\nSecurity\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted S/MIME signed message may\nlead to a denial of service\nDescription: A validation issue was addressed with improved logic. \nCVE-2018-4400: Yukinobu Nagayasu of LAC Co., Ltd. \n\nVoiceOver\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A local attacker may be able to view photos from the lock\nscreen\nDescription: A lock screen issue allowed access to photos via Reply\nWith Message on a locked device. \nCVE-2018-4387: videosdebarraquito\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Visiting a malicious website may lead to address bar spoofing\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2018-4385: an anonymous researcher\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. \nCVE-2018-4409: Sabri Haddouche (@pwnsdx) of Wire Swiss GmbH\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may lead to code\nexecution\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2018-4378: an anonymous researcher, zhunki of 360 ESG Codesafe\nTeam\n\nWiFi\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An attacker in a privileged position may be able to perform a\ndenial of service attack\nDescription: A denial of service issue was addressed with improved\nvalidation. \nCVE-2018-4368: Milan Stute and Alex Mariotto of Secure Mobile\nNetworking Lab at Technische UniversitA$?t Darmstadt\n\nAdditional recognition\n\nCertificate Signing\nWe would like to acknowledge YiAit Can YILMAZ (@yilmazcanyigit) for\ntheir assistance. \n\niBooks\nWe would like to acknowledge Sem VoigtlA$?nder of Fontys Hogeschool\nICT for their assistance. \n\nSecurity\nWe would like to acknowledge Marinos Bernitsas of Parachute for their\nassistance. \n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom https://www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update\nwill be \"iOS 12.1\". \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n\niQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgUpHHByb2R1Y3Qt\nc2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3HpTw/7\nBkh9bUEddgGUejpnjO1DRiBlHUDQMssF7nG2LM5JOcCDoLkeHSdcr86KnR7VEyYp\nqSllLijO9ZzrLtJuZSEelDCi+eL1Ojk3kP/6ZeMRIxDkYItR7EFWQUK71wcInk5k\nqPZp2FnKU3qx0Ax7wzQi3GTQk8CZCVWcuCzh0UA0Nc3rgk0bf29+7AKmgiTaT2Ra\nYo4bRIXRuyi+jE39hN4x41vwjSbaxr5EZb9rvL5HT6Idipcoc9aS+sDbsscXjz/5\n9WHlwAB5mxeqO3vY5WNlLhOUXXqMVRfPC/qxQocl86r2AE9jJedQFl/p9qpG59we\nFrAejzKTU+1GpI4dGY6puAJval5DlcedWBxsyBxFAT04HdY0pfgF4zpFDTHRj6no\nHnEvtF+pNgqX2OTTLCXtMG4r5c7b1yrOPYkM6FS+BjLV2H0X9n3PpvX0qvAqSTn3\nRGbkJqHFV4G/DwsWUQQOOXNCthEwhzbT2n7mc+rCtN1WPUu99fGGZusMAqetmVvl\nhgUIVPp9+ZHs64BlTzD+xu8e6jyoJ8YoPD9a/r+ENXxHJz6Mr8Jd/E2ZesN5tWpi\nsO3ajUx/d158T4jfAvIE8tJGungUgehPVIIR5120nYxHc6gMUAYzirwFptfvSpb8\nHWzMnE69KcP9Lnhtgp7fRv+HKpJmrsjOLKyldZzjZlA=\n=cetI\n-----END PGP SIGNATURE-----\n. ------------------------------------------------------------------------\nWebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0008\n------------------------------------------------------------------------\n\nDate reported : November 21, 2018\nAdvisory ID : WSA-2018-0008\nWebKitGTK+ Advisory URL : \nhttps://webkitgtk.org/security/WSA-2018-0008.html\nWPE WebKit Advisory URL : \nhttps://wpewebkit.org/security/WSA-2018-0008.html\nCVE identifiers : CVE-2018-4345, CVE-2018-4372, CVE-2018-4373,\n CVE-2018-4375, CVE-2018-4376, CVE-2018-4378,\n CVE-2018-4382, CVE-2018-4386, CVE-2018-4392,\n CVE-2018-4416. \n\nSeveral vulnerabilities were discovered in WebKitGTK+ and WPE WebKit. \n\nCVE-2018-4345\n Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before\n 2.22.1. \n Credit to an anonymous researcher. \n A cross-site scripting issue existed in WebKit. This issue was\n addressed with improved URL validation. \n\nCVE-2018-4372\n Versions affected: WebKitGTK+ before 2.22.4 and WPE WebKit before\n 2.22.2. \n Credit to HyungSeok Han, DongHyeon Oh, and Sang Kil Cha of KAIST\n Softsec Lab, Korea. \n Processing maliciously crafted web content may lead to arbitrary\n code execution. \n\nCVE-2018-4373\n Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0. \n Credit to ngg, alippai, DirtYiCE, KT of Tresorit working with Trend\n Microys Zero Day Initiative. \n Processing maliciously crafted web content may lead to arbitrary\n code execution. \n\nCVE-2018-4375\n Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before\n 2.22.0. \n Credit to Yu Haiwan and Wu Hongjun From Nanyang Technological\n University working with Trend Micro\u0027s Zero Day Initiative. \n Processing maliciously crafted web content may lead to arbitrary\n code execution. \n\nCVE-2018-4376\n Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before\n 2.22.0. \n Credit to 010 working with Trend Micro\u0027s Zero Day Initiative. \n Processing maliciously crafted web content may lead to arbitrary\n code execution. \n\nCVE-2018-4378\n Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before\n 2.22.0. \n Credit to an anonymous researcher, zhunki of 360 ESG Codesafe Team. \n Processing maliciously crafted web content may lead to code\n execution. \n\nCVE-2018-4382\n Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before\n 2.22.0. \n Credit to lokihardt of Google Project Zero. \n Processing maliciously crafted web content may lead to arbitrary\n code execution. \n\nCVE-2018-4386\n Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before\n 2.22.1. \n Credit to lokihardt of Google Project Zero. \n Processing maliciously crafted web content may lead to arbitrary\n code execution. \n\nCVE-2018-4392\n Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before\n 2.22.0. \n Credit to zhunki of 360 ESG Codesafe Team. \n Processing maliciously crafted web content may lead to arbitrary\n code execution. \n\nCVE-2018-4416\n Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before\n 2.22.0. \n Credit to lokihardt of Google Project Zero. \n Processing maliciously crafted web content may lead to arbitrary\n code execution. \n\n\nWe recommend updating to the latest stable versions of WebKitGTK+ and\nWPE WebKit. It is the best way to ensure that you are running safe\nversions of WebKit. Please check our websites for information about the\nlatest stable releases. \n\nFurther information about WebKitGTK+ and WPE WebKit security advisories\ncan be found at: https://webkitgtk.org/security.html or\nhttps://wpewebkit.org/security/. \n\nThe WebKitGTK+ and WPE WebKit team,\nNovember 21, 2018\n", "sources": [ { "db": "NVD", "id": "CVE-2018-4392" }, { "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "db": "VULHUB", "id": "VHN-134423" }, { "db": "VULMON", "id": "CVE-2018-4392" }, { "db": "PACKETSTORM", "id": "150106" }, { "db": "PACKETSTORM", "id": "150105" }, { "db": "PACKETSTORM", "id": "150107" }, { "db": "PACKETSTORM", "id": "150109" }, { "db": "PACKETSTORM", "id": "150104" }, { "db": "PACKETSTORM", "id": "150103" }, { "db": "PACKETSTORM", "id": "150431" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-4392", "trust": 3.3 }, { "db": "JVN", "id": "JVNVU96365720", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-014903", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201810-1498", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-134423", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-4392", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150106", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150105", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150107", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150109", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150104", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150103", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-134423" }, { "db": "VULMON", "id": "CVE-2018-4392" }, { "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "db": "PACKETSTORM", "id": "150106" }, { "db": "PACKETSTORM", "id": "150105" }, { "db": "PACKETSTORM", "id": "150107" }, { "db": "PACKETSTORM", "id": "150109" }, { "db": "PACKETSTORM", "id": "150104" }, { "db": "PACKETSTORM", "id": "150103" }, { "db": "PACKETSTORM", "id": "150431" }, { "db": "CNNVD", "id": "CNNVD-201810-1498" }, { "db": "NVD", "id": "CVE-2018-4392" } ] }, "id": "VAR-201904-1444", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-134423" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:28:46.398000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT209198", "trust": 0.8, "url": "https://support.apple.com/en-us/ht209198" }, { "title": "HT209192", "trust": 0.8, "url": "https://support.apple.com/en-us/ht209192" }, { "title": "HT209194", "trust": 0.8, "url": "https://support.apple.com/en-us/ht209194" }, { "title": "HT209195", "trust": 0.8, "url": "https://support.apple.com/en-us/ht209195" }, { "title": "HT209197", "trust": 0.8, "url": "https://support.apple.com/en-us/ht209197" }, { "title": "HT209192", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht209192" }, { "title": "HT209194", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht209194" }, { "title": "HT209195", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht209195" }, { "title": "HT209197", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht209197" }, { "title": "HT209198", "trust": 0.8, "url": "https://support.apple.com/ja-jp/ht209198" }, { "title": "Multiple Apple product WebKit Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=86476" }, { "title": "Apple: Safari 12.0.1", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=1c1ddadf66b53045fe0d2911a2871824" }, { "title": "Apple: iTunes 12.9.1 for Windows", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=7c7471ed217a2a07745d1e9479602210" }, { "title": "Apple: iCloud for Windows 7.8", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=5f08ec6fa9fd0c2fa8668b021247104e" }, { "title": "Apple: tvOS 12.1", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=d9354b498db864b176a3fafcdbeb4bd1" }, { "title": "Apple: watchOS 5.1", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=b42ff4ce08988ff94c6d08bc78897bf2" }, { "title": "Apple: iOS 12.1", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=f0a8e368c8096404df7f4474c9b1060e" }, { "title": "Superion", "trust": 0.1, "url": "https://github.com/zhunki/superion " }, { "title": "DRL-Guided-Fuzzing", "trust": 0.1, "url": "https://github.com/tangsongtju/drl-guided-fuzzing " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-4392" }, { "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "db": "CNNVD", "id": "CNNVD-201810-1498" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-134423" }, { "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "db": "NVD", "id": "CVE-2018-4392" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4392" }, { "trust": 1.8, "url": "https://support.apple.com/kb/ht209192" }, { "trust": 1.8, "url": "https://support.apple.com/kb/ht209194" }, { "trust": 1.8, "url": "https://support.apple.com/kb/ht209195" }, { "trust": 1.8, "url": "https://support.apple.com/kb/ht209196" }, { "trust": 1.8, "url": "https://support.apple.com/kb/ht209197" }, { "trust": 1.8, "url": "https://support.apple.com/kb/ht209198" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4392" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu96365720/index.html" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4386" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4372" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4378" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4382" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4416" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4375" }, { "trust": 0.6, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4376" }, { "trust": 0.6, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4373" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4377" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4409" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4398" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4374" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4394" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4371" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4369" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4413" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4368" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4400" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4419" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4384" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4420" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://www.rapid7.com/db/vulnerabilities/apple-itunes-cve-2018-4392" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/152290" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/download/" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht204641" }, { "trust": 0.1, "url": "https://support.apple.com/ht204283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4366" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4388" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4390" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4367" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4391" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4365" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4385" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4387" }, { "trust": 0.1, "url": "https://webkitgtk.org/security/wsa-2018-0008.html" }, { "trust": 0.1, "url": "https://webkitgtk.org/security.html" }, { "trust": 0.1, "url": "https://wpewebkit.org/security/wsa-2018-0008.html" }, { "trust": 0.1, "url": "https://wpewebkit.org/security/." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-4345" } ], "sources": [ { "db": "VULHUB", "id": "VHN-134423" }, { "db": "VULMON", "id": "CVE-2018-4392" }, { "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "db": "PACKETSTORM", "id": "150106" }, { "db": "PACKETSTORM", "id": "150105" }, { "db": "PACKETSTORM", "id": "150107" }, { "db": "PACKETSTORM", "id": "150109" }, { "db": "PACKETSTORM", "id": "150104" }, { "db": "PACKETSTORM", "id": "150103" }, { "db": "PACKETSTORM", "id": "150431" }, { "db": "CNNVD", "id": "CNNVD-201810-1498" }, { "db": "NVD", "id": "CVE-2018-4392" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-134423" }, { "db": "VULMON", "id": "CVE-2018-4392" }, { "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "db": "PACKETSTORM", "id": "150106" }, { "db": "PACKETSTORM", "id": "150105" }, { "db": "PACKETSTORM", "id": "150107" }, { "db": "PACKETSTORM", "id": "150109" }, { "db": "PACKETSTORM", "id": "150104" }, { "db": "PACKETSTORM", "id": "150103" }, { "db": "PACKETSTORM", "id": "150431" }, { "db": "CNNVD", "id": "CNNVD-201810-1498" }, { "db": "NVD", "id": "CVE-2018-4392" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-03T00:00:00", "db": "VULHUB", "id": "VHN-134423" }, { "date": "2019-04-03T00:00:00", "db": "VULMON", "id": "CVE-2018-4392" }, { "date": "2019-04-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "date": "2018-10-31T15:49:44", "db": "PACKETSTORM", "id": "150106" }, { "date": "2018-10-31T15:49:11", "db": "PACKETSTORM", "id": "150105" }, { "date": "2018-10-31T15:49:54", "db": "PACKETSTORM", "id": "150107" }, { "date": "2018-10-31T15:55:08", "db": "PACKETSTORM", "id": "150109" }, { "date": "2018-10-31T15:48:57", "db": "PACKETSTORM", "id": "150104" }, { "date": "2018-10-31T15:48:45", "db": "PACKETSTORM", "id": "150103" }, { "date": "2018-11-22T14:44:44", "db": "PACKETSTORM", "id": "150431" }, { "date": "2018-10-31T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1498" }, { "date": "2019-04-03T18:29:12.563000", "db": "NVD", "id": "CVE-2018-4392" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-05T00:00:00", "db": "VULHUB", "id": "VHN-134423" }, { "date": "2019-04-05T00:00:00", "db": "VULMON", "id": "CVE-2018-4392" }, { "date": "2019-04-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-014903" }, { "date": "2019-04-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201810-1498" }, { "date": "2019-04-05T16:12:19.880000", "db": "NVD", "id": "CVE-2018-4392" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201810-1498" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Apple Multiple memory corruption vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-014903" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code execution, xss", "sources": [ { "db": "PACKETSTORM", "id": "150106" }, { "db": "PACKETSTORM", "id": "150105" }, { "db": "PACKETSTORM", "id": "150109" }, { "db": "PACKETSTORM", "id": "150104" }, { "db": "PACKETSTORM", "id": "150103" }, { "db": "PACKETSTORM", "id": "150431" } ], "trust": 0.6 } }
gsd-2018-4392
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-4392", "description": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.", "id": "GSD-2018-4392", "references": [ "https://www.suse.com/security/cve/CVE-2018-4392.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-4392" ], "details": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8.", "id": "GSD-2018-4392", "modified": "2023-12-13T01:22:28.632402Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2018-4392", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "iOS, tvOS, watchOS, Safari, iTunes for Windows, iCloud for Windows", "version": { "version_data": [ { "version_value": "Versions prior to: iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing maliciously crafted web content may lead to arbitrary code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/kb/HT209192", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209192" }, { "name": "https://support.apple.com/kb/HT209195", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209195" }, { "name": "https://support.apple.com/kb/HT209194", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209194" }, { "name": "https://support.apple.com/kb/HT209197", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209197" }, { "name": "https://support.apple.com/kb/HT209198", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209198" }, { "name": "https://support.apple.com/kb/HT209196", "refsource": "MISC", "url": "https://support.apple.com/kb/HT209196" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.0.1", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "7.8", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.9.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2018-4392" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/kb/HT209198", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT209198" }, { "name": "https://support.apple.com/kb/HT209197", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT209197" }, { "name": "https://support.apple.com/kb/HT209196", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT209196" }, { "name": "https://support.apple.com/kb/HT209195", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT209195" }, { "name": "https://support.apple.com/kb/HT209194", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT209194" }, { "name": "https://support.apple.com/kb/HT209192", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/kb/HT209192" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2019-04-05T16:12Z", "publishedDate": "2019-04-03T18:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.