CVE-2018-4200

An issue was discovered in certain Apple products. iOS before 11.3.1 is affected. Safari before 11.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site that triggers a WebCore::jsElementScrollHeightGetter use-after-free.
References
Link Resource
http://www.securityfocus.com/bid/103961 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040743 Third Party Advisory VDB Entry
https://bugs.chromium.org/p/project-zero/issues/detail?id=1525 Exploit Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/201808-04 Third Party Advisory
https://support.apple.com/HT208741 Vendor Advisory
https://support.apple.com/HT208743 Vendor Advisory
https://support.apple.com/HT208850 Vendor Advisory
https://support.apple.com/HT208852 Vendor Advisory
https://support.apple.com/HT208853 Vendor Advisory
https://usn.ubuntu.com/3640-1/ Third Party Advisory
https://www.exploit-db.com/exploits/44566/ Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/103961 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040743 Third Party Advisory VDB Entry
https://bugs.chromium.org/p/project-zero/issues/detail?id=1525 Exploit Issue Tracking Third Party Advisory
https://security.gentoo.org/glsa/201808-04 Third Party Advisory
https://support.apple.com/HT208741 Vendor Advisory
https://support.apple.com/HT208743 Vendor Advisory
https://support.apple.com/HT208850 Vendor Advisory
https://support.apple.com/HT208852 Vendor Advisory
https://support.apple.com/HT208853 Vendor Advisory
https://usn.ubuntu.com/3640-1/ Third Party Advisory
https://www.exploit-db.com/exploits/44566/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 04:06

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103961 - VDB Entry, Third Party Advisory () http://www.securityfocus.com/bid/103961 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040743 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040743 - Third Party Advisory, VDB Entry
References () https://bugs.chromium.org/p/project-zero/issues/detail?id=1525 - Exploit, Issue Tracking, Third Party Advisory () https://bugs.chromium.org/p/project-zero/issues/detail?id=1525 - Exploit, Issue Tracking, Third Party Advisory
References () https://security.gentoo.org/glsa/201808-04 - Third Party Advisory () https://security.gentoo.org/glsa/201808-04 - Third Party Advisory
References () https://support.apple.com/HT208741 - Vendor Advisory () https://support.apple.com/HT208741 - Vendor Advisory
References () https://support.apple.com/HT208743 - Vendor Advisory () https://support.apple.com/HT208743 - Vendor Advisory
References () https://support.apple.com/HT208850 - Vendor Advisory () https://support.apple.com/HT208850 - Vendor Advisory
References () https://support.apple.com/HT208852 - Vendor Advisory () https://support.apple.com/HT208852 - Vendor Advisory
References () https://support.apple.com/HT208853 - Vendor Advisory () https://support.apple.com/HT208853 - Vendor Advisory
References () https://usn.ubuntu.com/3640-1/ - Third Party Advisory () https://usn.ubuntu.com/3640-1/ - Third Party Advisory
References () https://www.exploit-db.com/exploits/44566/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/44566/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-06-08 18:29

Updated : 2024-11-21 04:06


NVD link : CVE-2018-4200

Mitre link : CVE-2018-4200

CVE.ORG link : CVE-2018-4200


JSON object : View

Products Affected

apple

  • icloud
  • itunes
  • iphone_os
  • safari
  • tvos

canonical

  • ubuntu_linux

microsoft

  • windows
CWE
CWE-416

Use After Free