ID

VAR-201904-1474


CVE

CVE-2018-4360


TITLE

plural Apple Multiple memory corruption vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-014915

DESCRIPTION

Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7. Apple Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * Service operation interruption (DoS) * Arbitrary code execution * Script execution * information leak * Access restriction avoidance. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system. WebKit is one of the web browser engine components. A buffer error vulnerability exists in the WebKit component of several Apple products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2018-10-30-13 Additional information for APPLE-SA-2018-9-24-2 iTunes 12.9 for Windows iTunes 12.9 for Windows addresses the following: CFNetwork Available for: Windows 7 and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4126: Bruno Keith (@bkth_) working with Trend Micro's Zero Day Initiative Entry added October 30, 2018 CoreFoundation Available for: Windows 7 and later Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4412: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018 CoreFoundation Available for: Windows 7 and later Impact: An application may be able to gain elevated privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4414: The UK's National Cyber Security Centre (NCSC) Entry added October 30, 2018 CoreText Available for: Windows 7 and later Impact: Processing a maliciously crafted text file may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2018-4347: an anonymous researcher Entry added October 30, 2018 WebKit Available for: Windows 7 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2018-4197: Ivan Fratric of Google Project Zero CVE-2018-4306: Ivan Fratric of Google Project Zero CVE-2018-4312: Ivan Fratric of Google Project Zero CVE-2018-4314: Ivan Fratric of Google Project Zero CVE-2018-4315: Ivan Fratric of Google Project Zero CVE-2018-4317: Ivan Fratric of Google Project Zero CVE-2018-4318: Ivan Fratric of Google Project Zero WebKit Available for: Windows 7 and later Impact: A malicious website may exfiltrate image data cross-origin Description: A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. CVE-2018-4345: an anonymous researcher WebKit Available for: Windows 7 and later Impact: Unexpected interaction causes an ASSERT failure Description: A memory corruption issue was addressed with improved validation. CVE-2018-4191: found by OSS-Fuzz WebKit Available for: Windows 7 and later Impact: Cross-origin SecurityErrors includes the accessed frame's origin Description: The issue was addressed by removing origin information. CVE-2018-4311: Erling Alf Ellingsen (@steike) WebKit Available for: Windows 7 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2018-4299: Samuel GroI2 (saelo) working with Trend Micro's Zero Day Initiative CVE-2018-4323: Ivan Fratric of Google Project Zero CVE-2018-4328: Ivan Fratric of Google Project Zero CVE-2018-4358: @phoenhex team (@bkth_ @5aelo @_niklasb) working with Trend Micro's Zero Day Initiative CVE-2018-4359: Samuel GroA (@5aelo) CVE-2018-4360: William Bowling (@wcbowling) Entry added October 30, 2018 WebKit Available for: Windows 7 and later Impact: A malicious website may cause unexepected cross-origin behavior Description: A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. CVE-2018-4319: John Pettitt of Google WebKit Available for: Windows 7 and later Impact: A malicious website may be able to execute scripts in the context of another website Description: A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. CVE-2018-4309: an anonymous researcher working with Trend Micro's Zero Day Initiative WebKit Available for: Windows 7 and later Impact: Unexpected interaction causes an ASSERT failure Description: A memory consumption issue was addressed with improved memory handling. CVE-2018-4361: found by OSS-Fuzz Additional recognition SQLite We would like to acknowledge Andreas Kurtz (@aykay) of NESO Security Labs GmbH for their assistance. WebKit We would like to acknowledge Cary Hartline, Hanming Zhang from 360 Vuclan team, Tencent Keen Security Lab working with Trend Micro's Zero Day Initiative, and Zach Malone of CA Technologies for their assistance. Installation note: iTunes 12.9 for Windows may be obtained from: https://www.apple.com/itunes/download/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgUpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3H36BAA kOdio5aQDT6TT5y302gTD8IRudSct/JHVCjMbaEU4Q28RKb5yumU3j+x3QylMwx8 n60VkwST8bzxjffZa+ER8F+8+NdPdcWtyYPHauEOt/ICKWLmxXZr3JIXk1XIxwz2 I9Ca9kkO+q6lWSjYVk44ZnEplEj4UctE8FoDTCXOsaATcPOeNGZttxjHBZLEnMHg 7vcFaJ7fQQf3ECuZG7HLXWvelQCzOSR1dNXUeAXTPoVrKAEBRk7Z8/UlB/mRYntv 0GSaJZCIMO8r/TwS/+KWzHgtRREusR9Sk827yDVZoqL8q3mMprIoospOiHsezEnq RReMU2sNCc6mm2x28gnZrjQgxPL4abwV+z/P8oloOjnN3gydUnQXFM606z2ZCp2y GgjrnIjLtlri1rx1wLccqMPi2GZFmOcNvgPBBuHfWj5GpPjE6ILWXcy6cg+hfgD9 CCUMqJFTW3gclGjno5nfqq7yaxJaD+CniGNhFxZxhOVbTXzMQ7T24biUz+ulr0Ip Yi11Xlb+xUk9SGP0ioci9nsfV8MAKy4eb/JpDIXBkQL9LWzp4z+gYeoNUZOyK9pB Mr3Kn15K76ApsoBFkFNI2AXwvXFtda5no5jy7EarbefmyD1BA0W9Tfg1kJEmh1J5 cdFwOCALT9HHUn7bccDIPvQlVH/sgEjVkMRapHl72SE= =5IB1 -----END PGP SIGNATURE-----

Trust: 2.79

sources: NVD: CVE-2018-4360 // JVNDB: JVNDB-2018-014915 // JVNDB: JVNDB-2018-008148 // VULHUB: VHN-134391 // VULMON: CVE-2018-4360 // PACKETSTORM: 150115 // PACKETSTORM: 150114 // PACKETSTORM: 149722

AFFECTED PRODUCTS

vendor:applemodel:safariscope:ltversion:12

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:7.7

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:12.0

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:12.9

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:12

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:for windows 7.7 (windows 7 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12 (ipad air or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12 (iphone 5s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12 (ipod touch first 6 generation )

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:for windows 12.9 (windows 7 or later )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:12 (macos high sierra 10.13.6)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:12 (macos mojave 10.14)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:12 (macos sierra 10.12.6)

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:12 (apple tv 4k)

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:12 (apple tv first 4 generation )

Trust: 0.8

vendor:applemodel:icloudscope:ltversion:7.7 earlier

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12.0.1 earlier

Trust: 0.8

sources: JVNDB: JVNDB-2018-014915 // JVNDB: JVNDB-2018-008148 // NVD: CVE-2018-4360

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-4360
value: HIGH

Trust: 1.0

NVD: CVE-2018-4360
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201810-1579
value: HIGH

Trust: 0.6

VULHUB: VHN-134391
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-4360
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-4360
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-134391
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-4360
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-134391 // VULMON: CVE-2018-4360 // JVNDB: JVNDB-2018-014915 // CNNVD: CNNVD-201810-1579 // NVD: CVE-2018-4360

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-134391 // JVNDB: JVNDB-2018-014915 // NVD: CVE-2018-4360

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201810-1579

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201810-1579

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014915

PATCH

title:HT209141url:https://support.apple.com/en-us/HT209141

Trust: 1.6

title:HT209106url:https://support.apple.com/en-us/HT209106

Trust: 0.8

title:HT209107url:https://support.apple.com/en-us/HT209107

Trust: 0.8

title:HT209109url:https://support.apple.com/en-us/HT209109

Trust: 0.8

title:HT209140url:https://support.apple.com/en-us/HT209140

Trust: 0.8

title:HT209106url:https://support.apple.com/ja-jp/HT209106

Trust: 0.8

title:HT209107url:https://support.apple.com/ja-jp/HT209107

Trust: 0.8

title:HT209109url:https://support.apple.com/ja-jp/HT209109

Trust: 0.8

title:HT209140url:https://support.apple.com/ja-jp/HT209140

Trust: 0.8

title:HT209141url:https://support.apple.com/ja-jp/HT209141

Trust: 0.8

title:About the security content of iOS 12.0.1url:https://support.apple.com/en-us/HT209162

Trust: 0.8

title:Apple Safari , tvOS and iTunes for Windows WebKit Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86548

Trust: 0.6

sources: JVNDB: JVNDB-2018-014915 // JVNDB: JVNDB-2018-008148 // CNNVD: CNNVD-201810-1579

EXTERNAL IDS

db:NVDid:CVE-2018-4360

Trust: 2.9

db:JVNid:JVNVU92800088

Trust: 1.6

db:JVNid:JVNVU93341447

Trust: 0.8

db:JVNDBid:JVNDB-2018-014915

Trust: 0.8

db:JVNDBid:JVNDB-2018-008148

Trust: 0.8

db:CNNVDid:CNNVD-201810-1579

Trust: 0.7

db:VULHUBid:VHN-134391

Trust: 0.1

db:VULMONid:CVE-2018-4360

Trust: 0.1

db:PACKETSTORMid:150115

Trust: 0.1

db:PACKETSTORMid:150114

Trust: 0.1

db:PACKETSTORMid:149722

Trust: 0.1

sources: VULHUB: VHN-134391 // VULMON: CVE-2018-4360 // JVNDB: JVNDB-2018-014915 // JVNDB: JVNDB-2018-008148 // PACKETSTORM: 150115 // PACKETSTORM: 150114 // PACKETSTORM: 149722 // CNNVD: CNNVD-201810-1579 // NVD: CVE-2018-4360

REFERENCES

url:https://devcraft.io/2019/02/19/cve-2018-4360-webkit-information-leakage-with-dommatrixinvertself.html

Trust: 1.8

url:https://github.com/webkit/webkit/commit/a0b0e01648892b0bb60a01aca619eec85eb27f7a

Trust: 1.8

url:https://support.apple.com/kb/ht209106

Trust: 1.8

url:https://support.apple.com/kb/ht209107

Trust: 1.8

url:https://support.apple.com/kb/ht209109

Trust: 1.8

url:https://support.apple.com/kb/ht209140

Trust: 1.8

url:https://support.apple.com/kb/ht209141

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-4360

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4360

Trust: 0.8

url:https://jvn.jp/vu/jvnvu92800088/index.html

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93341447/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu92800088

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-4323

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4319

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4318

Trust: 0.3

url:https://support.apple.com/kb/ht201222

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4191

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4361

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4309

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4311

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4315

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4197

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4345

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4316

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4359

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4317

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4306

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4358

Trust: 0.3

url:https://www.apple.com/support/security/pgp/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4312

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4328

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4314

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4299

Trust: 0.3

url:https://support.apple.com/ht204283

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-4412

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-4414

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-4126

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-4347

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://seclists.org/fulldisclosure/2018/nov/19

Trust: 0.1

url:https://www.apple.com/itunes/download/

Trust: 0.1

sources: VULHUB: VHN-134391 // VULMON: CVE-2018-4360 // JVNDB: JVNDB-2018-014915 // JVNDB: JVNDB-2018-008148 // PACKETSTORM: 150115 // PACKETSTORM: 150114 // PACKETSTORM: 149722 // CNNVD: CNNVD-201810-1579 // NVD: CVE-2018-4360

CREDITS

William Bowling (@wcbowling)

Trust: 0.6

sources: CNNVD: CNNVD-201810-1579

SOURCES

db:VULHUBid:VHN-134391
db:VULMONid:CVE-2018-4360
db:JVNDBid:JVNDB-2018-014915
db:JVNDBid:JVNDB-2018-008148
db:PACKETSTORMid:150115
db:PACKETSTORMid:150114
db:PACKETSTORMid:149722
db:CNNVDid:CNNVD-201810-1579
db:NVDid:CVE-2018-4360

LAST UPDATE DATE

2024-11-23T20:01:22.133000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-134391date:2019-05-13T00:00:00
db:VULMONid:CVE-2018-4360date:2019-05-13T00:00:00
db:JVNDBid:JVNDB-2018-014915date:2019-04-17T00:00:00
db:JVNDBid:JVNDB-2018-008148date:2018-10-10T00:00:00
db:CNNVDid:CNNVD-201810-1579date:2019-05-14T00:00:00
db:NVDid:CVE-2018-4360date:2024-11-21T04:07:15.840

SOURCES RELEASE DATE

db:VULHUBid:VHN-134391date:2019-04-03T00:00:00
db:VULMONid:CVE-2018-4360date:2019-04-03T00:00:00
db:JVNDBid:JVNDB-2018-014915date:2019-04-17T00:00:00
db:JVNDBid:JVNDB-2018-008148date:2018-10-10T00:00:00
db:PACKETSTORMid:150115date:2018-10-31T16:10:39
db:PACKETSTORMid:150114date:2018-10-31T16:10:29
db:PACKETSTORMid:149722date:2018-10-09T16:58:43
db:CNNVDid:CNNVD-201810-1579date:2018-11-02T00:00:00
db:NVDid:CVE-2018-4360date:2019-04-03T18:29:10.253