CVE-2018-4222

An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages a getWasmBufferFromValue out-of-bounds read during WebAssembly compilation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 04:07

Type Values Removed Values Added
References () http://www.securitytracker.com/id/1041029 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1041029 - Third Party Advisory, VDB Entry
References () https://bugs.chromium.org/p/project-zero/issues/detail?id=1545 - Exploit, Issue Tracking, Third Party Advisory () https://bugs.chromium.org/p/project-zero/issues/detail?id=1545 - Exploit, Issue Tracking, Third Party Advisory
References () https://security.gentoo.org/glsa/201808-04 - Third Party Advisory () https://security.gentoo.org/glsa/201808-04 - Third Party Advisory
References () https://support.apple.com/HT208848 - Vendor Advisory () https://support.apple.com/HT208848 - Vendor Advisory
References () https://support.apple.com/HT208850 - Vendor Advisory () https://support.apple.com/HT208850 - Vendor Advisory
References () https://support.apple.com/HT208851 - Vendor Advisory () https://support.apple.com/HT208851 - Vendor Advisory
References () https://support.apple.com/HT208852 - Vendor Advisory () https://support.apple.com/HT208852 - Vendor Advisory
References () https://support.apple.com/HT208853 - Vendor Advisory () https://support.apple.com/HT208853 - Vendor Advisory
References () https://support.apple.com/HT208854 - Vendor Advisory () https://support.apple.com/HT208854 - Vendor Advisory
References () https://usn.ubuntu.com/3687-1/ - Third Party Advisory () https://usn.ubuntu.com/3687-1/ - Third Party Advisory
References () https://www.exploit-db.com/exploits/44859/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/44859/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2018-06-08 18:29

Updated : 2024-11-21 04:07


NVD link : CVE-2018-4222

Mitre link : CVE-2018-4222

CVE.ORG link : CVE-2018-4222


JSON object : View

Products Affected

apple

  • icloud
  • watchos
  • itunes
  • iphone_os
  • safari
  • tvos

canonical

  • ubuntu_linux

microsoft

  • windows
CWE
CWE-125

Out-of-bounds Read