← Voltar para CVEs
CVE-2018-4144
N/ADescricao
An issue was discovered in certain Apple products. iOS before 11.3 is affected. macOS before 10.13.4 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. tvOS before 11.3 is affected. watchOS before 4.3 is affected. The issue involves the "Security" component. A buffer overflow allows attackers to execute arbitrary code in a privileged context via a crafted app.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado4/3/2018
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
apple:icloudapple:iphone_osapple:itunesapple:mac_os_xapple:tvosapple:watchosmicrosoft:windows
Fraquezas (CWE)
CWE-119
Referencias
http://www.securityfocus.com/bid/103582(product-security@apple.com)
http://www.securitytracker.com/id/1040604(product-security@apple.com)
http://www.securitytracker.com/id/1040608(product-security@apple.com)
https://support.apple.com/HT208692(product-security@apple.com)
https://support.apple.com/HT208693(product-security@apple.com)
https://support.apple.com/HT208694(product-security@apple.com)
https://support.apple.com/HT208696(product-security@apple.com)
https://support.apple.com/HT208697(product-security@apple.com)
https://support.apple.com/HT208698(product-security@apple.com)
http://www.securityfocus.com/bid/103582(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040604(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040608(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208692(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208693(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208694(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208696(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208697(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT208698(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.