ID

VAR-201804-1184


CVE

CVE-2018-4124


TITLE

plural Apple Product CoreText Service disruption in components (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2018-004063

DESCRIPTION

An issue was discovered in certain Apple products. iOS before 11.2.6 is affected. macOS before 10.13.3 Supplemental Update is affected. tvOS before 11.2.6 is affected. watchOS before 4.2.3 is affected. The issue involves the "CoreText" component. It allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via a crafted string containing a certain Telugu character. Apple iOS, macOS Sierra, tvOS, and watchOS are all products of the US company Apple (Apple). Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system; watchOS is a smart watch operating system. CoreText is one of the typesetting engine components. The following products and versions are affected: Apple iOS prior to 11.2.6; macOS High Sierra prior to 10.13.3 Supplemental Update; tvOS prior to 11.2.6; watchOS prior to 4.2.3. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2018-02-19-1 iOS 11.2.6 iOS 11.2.6 is now available and addresses the following: CoreText Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted string may lead to heap corruption Description: A memory corruption issue was addressed through improved input validation. CVE-2018-4124: an anonymous researcher Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "11.2.6". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCgAGBQJaizCFAAoJEIOj74w0bLRGudgP/A21nHvIArfC6P8S52R3m6H9 UqRAb7o9dC4kK7UZiE/mXYQMcPZrxCM9XNs5U1o/cziFibAdHIUMsCcXpPVZEC0/ KLj2XjTCPSAsFEqgkWXbzWi6epnir+yHc3SUgTBsQk78ZA+ArDGgY27lY32wPpC1 nXbqe18I/mnEX+GHzgdnST27bDX8aBENJYeJp3bUugfDXplO8uZusTAzowh6Z+9j lzt5gt3H01RRflVf2J4jCI+MD3FQHOP/CvW2srVofRvtRMRxfOMJDmbFCkqp7Ep5 Np08UjTaWNVBVNrtt0O1nhMS30iFcFSHE50TuHeS0XGnx8yVJOOM4Psik8iRlCGv 9F3lXcIMw4Nh4Ff2u3YrhaFbtt7lS5nKPwAgzzTjuDYQiA1XUBKU4x9KbpY8Vkr2 GX+tLHfkp48jPMhafEi4e2VS7ysvcK7vcgPzs+oy+6Pxze0T0/G/vKfDLTGYzTLS CEqCM0rVlv3tOYZn9eF+Dl8jAJ2NDCxyGAV8AqWFNkMgDSc4UhCQOVqV/iXE8ks3 UGQz3e3sXIGlLD3xBmuQ183PvX6b8rEUDfxwh/ixBXv3hJt7A+mR9EXsj/SXhXXG 3bsZdfW61mEdMUfVllJpt9ctceX7q1BAJbLDnxlMJUNAFVggfcERWLPKTwWbREhX xu7Xlj99gSjM4B0zFq1F =3j+M -----END PGP SIGNATURE----- . Alternatively, on your watch, select "My Watch > General > About"

Trust: 2.07

sources: NVD: CVE-2018-4124 // JVNDB: JVNDB-2018-004063 // VULHUB: VHN-134155 // PACKETSTORM: 146481 // PACKETSTORM: 146483 // PACKETSTORM: 146482 // PACKETSTORM: 146484

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:ltversion:11.2.6

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:4.2.3

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:11.2.6

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.13.3

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.13.3

Trust: 0.8

vendor:applemodel:iosscope:ltversion:11.2.6 (ipad air or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:11.2.6 (iphone 5s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:11.2.6 (ipod touch first 6 generation )

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:11.2.6 (apple tv 4k)

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:11.2.6 (apple tv first 4 generation )

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:4.2.3 (apple watch all models )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:9.3.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 0.6

sources: JVNDB: JVNDB-2018-004063 // CNNVD: CNNVD-201804-181 // NVD: CVE-2018-4124

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-4124
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-4124
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-201804-181
value: CRITICAL

Trust: 0.6

VULHUB: VHN-134155
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-4124
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-134155
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 8.5
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-4124
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-134155 // JVNDB: JVNDB-2018-004063 // CNNVD: CNNVD-201804-181 // NVD: CVE-2018-4124

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-134155 // JVNDB: JVNDB-2018-004063 // NVD: CVE-2018-4124

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201804-181

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201804-181

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-004063

PATCH

title:HT208534url:https://support.apple.com/en-us/HT208534

Trust: 0.8

title:HT208535url:https://support.apple.com/en-us/HT208535

Trust: 0.8

title:HT208536url:https://support.apple.com/en-us/HT208536

Trust: 0.8

title:HT208537url:https://support.apple.com/en-us/HT208537

Trust: 0.8

title:HT208534url:https://support.apple.com/ja-jp/HT208534

Trust: 0.8

title:HT208535url:https://support.apple.com/ja-jp/HT208535

Trust: 0.8

title:HT208536url:https://support.apple.com/ja-jp/HT208536

Trust: 0.8

title:HT208537url:https://support.apple.com/ja-jp/HT208537

Trust: 0.8

title:Multiple Apple product CoreText Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83033

Trust: 0.6

sources: JVNDB: JVNDB-2018-004063 // CNNVD: CNNVD-201804-181

EXTERNAL IDS

db:NVDid:CVE-2018-4124

Trust: 2.9

db:SECTRACKid:1040396

Trust: 1.7

db:JVNDBid:JVNDB-2018-004063

Trust: 0.8

db:CNNVDid:CNNVD-201804-181

Trust: 0.6

db:PACKETSTORMid:146482

Trust: 0.2

db:PACKETSTORMid:146484

Trust: 0.2

db:PACKETSTORMid:146481

Trust: 0.2

db:PACKETSTORMid:146483

Trust: 0.2

db:VULHUBid:VHN-134155

Trust: 0.1

sources: VULHUB: VHN-134155 // JVNDB: JVNDB-2018-004063 // PACKETSTORM: 146481 // PACKETSTORM: 146483 // PACKETSTORM: 146482 // PACKETSTORM: 146484 // CNNVD: CNNVD-201804-181 // NVD: CVE-2018-4124

REFERENCES

url:https://support.apple.com/ht208534

Trust: 1.7

url:https://support.apple.com/ht208535

Trust: 1.7

url:https://support.apple.com/ht208536

Trust: 1.7

url:https://support.apple.com/ht208537

Trust: 1.7

url:https://nakedsecurity.sophos.com/2018/02/20/apple-fixes-that-1-character-to-crash-your-mac-and-iphone-bug/

Trust: 1.7

url:http://www.securitytracker.com/id/1040396

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-4124

Trust: 1.2

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4124

Trust: 0.8

url:https://support.apple.com/kb/ht201222

Trust: 0.4

url:https://www.apple.com/support/security/pgp/

Trust: 0.4

url:http://gpgtools.org

Trust: 0.4

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

sources: VULHUB: VHN-134155 // JVNDB: JVNDB-2018-004063 // PACKETSTORM: 146481 // PACKETSTORM: 146483 // PACKETSTORM: 146482 // PACKETSTORM: 146484 // CNNVD: CNNVD-201804-181 // NVD: CVE-2018-4124

CREDITS

Apple

Trust: 0.4

sources: PACKETSTORM: 146481 // PACKETSTORM: 146483 // PACKETSTORM: 146482 // PACKETSTORM: 146484

SOURCES

db:VULHUBid:VHN-134155
db:JVNDBid:JVNDB-2018-004063
db:PACKETSTORMid:146481
db:PACKETSTORMid:146483
db:PACKETSTORMid:146482
db:PACKETSTORMid:146484
db:CNNVDid:CNNVD-201804-181
db:NVDid:CVE-2018-4124

LAST UPDATE DATE

2024-11-23T22:45:23.751000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-134155date:2019-03-08T00:00:00
db:JVNDBid:JVNDB-2018-004063date:2018-06-08T00:00:00
db:CNNVDid:CNNVD-201804-181date:2019-03-13T00:00:00
db:NVDid:CVE-2018-4124date:2024-11-21T04:06:48.753

SOURCES RELEASE DATE

db:VULHUBid:VHN-134155date:2018-04-03T00:00:00
db:JVNDBid:JVNDB-2018-004063date:2018-06-08T00:00:00
db:PACKETSTORMid:146481date:2018-02-19T22:22:22
db:PACKETSTORMid:146483date:2018-02-19T23:44:44
db:PACKETSTORMid:146482date:2018-02-19T22:22:33
db:PACKETSTORMid:146484date:2018-02-19T23:03:33
db:CNNVDid:CNNVD-201804-181date:2018-04-03T00:00:00
db:NVDid:CVE-2018-4124date:2018-04-03T06:29:05.453