← Retour aux CVEs
CVE-2018-4144
N/ADescription
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Security" component. A buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app.
Details CVE
Score CVSS v3.1N/A
Publie4/3/2018
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
apple:icloudapple:iphone_osapple:itunesapple:mac_os_xapple:tvosapple:watchosmicrosoft:windows
Faiblesses (CWE)
CWE-119
References
http://www.securityfocus.com/bid/103582(product-security@apple.com)
http://www.securitytracker.com/id/1040604(product-security@apple.com)
http://www.securitytracker.com/id/1040608(product-security@apple.com)
https://support.apple.com/HT208692(product-security@apple.com)
https://support.apple.com/HT208693(product-security@apple.com)
https://support.apple.com/HT208694(product-security@apple.com)
https://support.apple.com/HT208696(product-security@apple.com)
https://support.apple.com/HT208697(product-security@apple.com)
https://support.apple.com/HT208698(product-security@apple.com)
http://www.securityfocus.com/bid/103582(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040604(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040608(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208692(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208693(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208694(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208696(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208697(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208698(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.