← Zuruck zu CVEs
CVE-2018-4144
N/ABeschreibung
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Security" component. A buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht4/3/2018
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apple:icloudapple:iphone_osapple:itunesapple:mac_os_xapple:tvosapple:watchosmicrosoft:windows
Schwachen (CWE)
CWE-119
Referenzen
http://www.securityfocus.com/bid/103582(product-security@apple.com)
http://www.securitytracker.com/id/1040604(product-security@apple.com)
http://www.securitytracker.com/id/1040608(product-security@apple.com)
https://support.apple.com/HT208692(product-security@apple.com)
https://support.apple.com/HT208693(product-security@apple.com)
https://support.apple.com/HT208694(product-security@apple.com)
https://support.apple.com/HT208696(product-security@apple.com)
https://support.apple.com/HT208697(product-security@apple.com)
https://support.apple.com/HT208698(product-security@apple.com)
http://www.securityfocus.com/bid/103582(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040604(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040608(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208692(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208693(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208694(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208696(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208697(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208698(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.