ID

VAR-201904-1367


CVE

CVE-2018-4407


TITLE

plural Apple Updates to product vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2018-008908

DESCRIPTION

A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5. Apple Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: Detail is Apple See the information provided by. * HTTP Through the client AFP Server attack * Arbitrary code execution * information leak * Buffer overflow * Privilege escalation * Service operation interruption (DoS) * File system tampering * UI Spoofing * Limit avoidance * Cross-site scripting * Address bar impersonation. plural Apple The product has a memory corruption vulnerability due to a lack of validation.The memory may be damaged. Apple macOS High Sierra and so on are a set of dedicated operating systems developed by Apple for Mac computers. A security vulnerability exists in the Kernel component of Apple macOS Sierra 10.12.6 and macOS High Sierra 10.13.6

Trust: 3.24

sources: NVD: CVE-2018-4407 // JVNDB: JVNDB-2018-008908 // JVNDB: JVNDB-2018-014949 // JVNDB: JVNDB-2018-007762 // VULHUB: VHN-134438 // VULMON: CVE-2018-4407

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:ltversion:10.14

Trust: 1.8

vendor:applemodel:watchosscope:ltversion:5.0

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:12.0

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:12

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:for windows 7.8 earlier

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12.1 earlier

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:12.9.1 earlier

Trust: 0.8

vendor:applemodel:macos high sierrascope:eqversion:(security update 2018-001 not applied )

Trust: 0.8

vendor:applemodel:macos mojavescope:ltversion:10.14.1 earlier

Trust: 0.8

vendor:applemodel:macos sierrascope:eqversion:(security update 2018-005 not applied )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:12.0.1 earlier

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:12.1 earlier

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:5.1 earlier

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.12.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.13.6

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12 (ipad air or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12 (iphone 5s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12 (ipod touch first 6 generation )

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:12 (apple tv 4k)

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:12 (apple tv first 4 generation )

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:5 (apple watch series 1 or later )

Trust: 0.8

vendor:applemodel:macos mojavescope:ltversion:10.14 earlier

Trust: 0.8

sources: JVNDB: JVNDB-2018-008908 // JVNDB: JVNDB-2018-014949 // JVNDB: JVNDB-2018-007762 // NVD: CVE-2018-4407

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-4407
value: HIGH

Trust: 1.0

NVD: CVE-2018-4407
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201810-1510
value: HIGH

Trust: 0.6

VULHUB: VHN-134438
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-4407
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-4407
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-134438
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-4407
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-134438 // VULMON: CVE-2018-4407 // JVNDB: JVNDB-2018-014949 // CNNVD: CNNVD-201810-1510 // NVD: CVE-2018-4407

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-134438 // JVNDB: JVNDB-2018-014949 // NVD: CVE-2018-4407

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201810-1510

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201810-1510

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-008908

PATCH

title:About the security content of macOS Mojave 10.14.1, Security Update 2018-001 High Sierra, Security Update 2018-005 Sierraurl:https://support.apple.com/en-us/HT209193

Trust: 1.6

title:HT209139url:https://support.apple.com/en-us/HT209139

Trust: 1.6

title:About the security content of iTunes 12.9.1url:https://support.apple.com/en-us/HT209197

Trust: 0.8

title: About the security content of iCloud for Windows 7.8 url:https://support.apple.com/en-us/HT209198

Trust: 0.8

title:About the security content of Safari 12.0.1url:https://support.apple.com/en-us/HT209196

Trust: 0.8

title: About the security content of tvOS 12.1url:https://support.apple.com/en-us/HT209194

Trust: 0.8

title: About the security content of iOS 12.1url:https://support.apple.com/en-us/HT209192

Trust: 0.8

title: About the security content of watchOS 5.1url:https://support.apple.com/en-us/HT209195

Trust: 0.8

title:HT209106url:https://support.apple.com/en-us/HT209106

Trust: 0.8

title:HT209107url:https://support.apple.com/en-us/HT209107

Trust: 0.8

title:HT209108url:https://support.apple.com/en-us/HT209108

Trust: 0.8

title:HT209106url:https://support.apple.com/ja-jp/HT209106

Trust: 0.8

title:HT209107url:https://support.apple.com/ja-jp/HT209107

Trust: 0.8

title:HT209108url:https://support.apple.com/ja-jp/HT209108

Trust: 0.8

title:HT209139url:https://support.apple.com/ja-jp/HT209139

Trust: 0.8

title:HT209193url:https://support.apple.com/ja-jp/HT209193

Trust: 0.8

title:Apple macOS Sierra Kernel Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=86488

Trust: 0.6

title:node-cve-2018-4407url:https://github.com/SamDecrock/node-cve-2018-4407

Trust: 0.1

title:AppleDOS (CVE-2018-4407)url:https://github.com/farisv/AppleDOS

Trust: 0.1

title:CVE-2018-4407 iOS Attack Exploiturl:https://github.com/zeng9t/CVE-2018-4407-iOS-exploit-

Trust: 0.1

title:CVE-2018-4407 Memory Corruptionurl:https://github.com/NotEth1calHack3r/iOS-Kernel-Crash

Trust: 0.1

title:CVE-2018-4407url:https://github.com/lucagiovagnoli/CVE-2018-4407

Trust: 0.1

title:CVE-2018-4407url:https://github.com/Fans0n-Fan/CVE-2018-4407

Trust: 0.1

title: - url:https://github.com/Pa55w0rd/check_icmp_dos

Trust: 0.1

sources: VULMON: CVE-2018-4407 // JVNDB: JVNDB-2018-008908 // JVNDB: JVNDB-2018-014949 // JVNDB: JVNDB-2018-007762 // CNNVD: CNNVD-201810-1510

EXTERNAL IDS

db:NVDid:CVE-2018-4407

Trust: 2.6

db:JVNid:JVNVU96365720

Trust: 1.6

db:JVNid:JVNVU99356481

Trust: 1.6

db:PACKETSTORMid:172832

Trust: 1.6

db:JVNDBid:JVNDB-2018-008908

Trust: 0.8

db:JVNid:JVNVU93341447

Trust: 0.8

db:JVNDBid:JVNDB-2018-014949

Trust: 0.8

db:JVNDBid:JVNDB-2018-007762

Trust: 0.8

db:CNNVDid:CNNVD-201810-1510

Trust: 0.7

db:SEEBUGid:SSVID-97634

Trust: 0.1

db:VULHUBid:VHN-134438

Trust: 0.1

db:VULMONid:CVE-2018-4407

Trust: 0.1

sources: VULHUB: VHN-134438 // VULMON: CVE-2018-4407 // JVNDB: JVNDB-2018-008908 // JVNDB: JVNDB-2018-014949 // JVNDB: JVNDB-2018-007762 // CNNVD: CNNVD-201810-1510 // NVD: CVE-2018-4407

REFERENCES

url:https://support.apple.com/kb/ht209106

Trust: 1.7

url:https://support.apple.com/kb/ht209107

Trust: 1.7

url:https://support.apple.com/kb/ht209108

Trust: 1.7

url:https://support.apple.com/kb/ht209139

Trust: 1.7

url:https://support.apple.com/kb/ht209193

Trust: 1.7

url:http://packetstormsecurity.com/files/172832/ios-11.4.1-macos-10.13.6-icmp_error-heap-buffer-overflow.html

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-4407

Trust: 1.4

url:https://jvn.jp/vu/jvnvu96365720/

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4407

Trust: 0.8

url:https://jvn.jp/vu/jvnvu96365720/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99356481/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93341447/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99356481/

Trust: 0.8

sources: VULHUB: VHN-134438 // JVNDB: JVNDB-2018-008908 // JVNDB: JVNDB-2018-014949 // JVNDB: JVNDB-2018-007762 // CNNVD: CNNVD-201810-1510 // NVD: CVE-2018-4407

SOURCES

db:VULHUBid:VHN-134438
db:VULMONid:CVE-2018-4407
db:JVNDBid:JVNDB-2018-008908
db:JVNDBid:JVNDB-2018-014949
db:JVNDBid:JVNDB-2018-007762
db:CNNVDid:CNNVD-201810-1510
db:NVDid:CVE-2018-4407

LAST UPDATE DATE

2024-11-23T19:59:15.732000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-134438date:2019-04-05T00:00:00
db:VULMONid:CVE-2018-4407date:2023-06-12T00:00:00
db:JVNDBid:JVNDB-2018-008908date:2018-11-01T00:00:00
db:JVNDBid:JVNDB-2018-014949date:2019-04-18T00:00:00
db:JVNDBid:JVNDB-2018-007762date:2018-09-26T00:00:00
db:CNNVDid:CNNVD-201810-1510date:2023-06-13T00:00:00
db:NVDid:CVE-2018-4407date:2024-11-21T04:07:21.230

SOURCES RELEASE DATE

db:VULHUBid:VHN-134438date:2019-04-03T00:00:00
db:VULMONid:CVE-2018-4407date:2019-04-03T00:00:00
db:JVNDBid:JVNDB-2018-008908date:2018-11-01T00:00:00
db:JVNDBid:JVNDB-2018-014949date:2019-04-18T00:00:00
db:JVNDBid:JVNDB-2018-007762date:2018-09-26T00:00:00
db:CNNVDid:CNNVD-201810-1510date:2018-10-31T00:00:00
db:NVDid:CVE-2018-4407date:2019-04-03T18:29:13.610