ID

VAR-201904-1444


CVE

CVE-2018-4392


TITLE

plural Apple Multiple memory corruption vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2018-014903

DESCRIPTION

Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12.1, tvOS 12.1, watchOS 5.1, Safari 12.0.1, iTunes 12.9.1, iCloud for Windows 7.8. plural Apple There are multiple memory corruption vulnerabilities in the product due to flaws in memory handling.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system. WebKit is one of the web browser engine components. A buffer error vulnerability exists in the WebKit component of several Apple products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system. Alternatively, on your watch, select "My Watch > General > About". CVE-2018-4378: an anonymous researcher, zhunki of 360 ESG Codesafe Team Installation note: Safari 12.0.1 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2018-10-30-1 iOS 12.1 iOS 12.1 is now available and addresses the following: AppleAVD Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing malicious video via FaceTime may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4384: Natalie Silvanovich of Google Project Zero Contacts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted vcf file may lead to a denial of service Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2018-4365: an anonymous researcher CoreCrypto Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker may be able to exploit a weakness in the Miller-Rabin primality test to incorrectly identify prime numbers Description: An issue existed in the method for determining prime numbers. CVE-2018-4398: Martin Albrecht, Jake Massimo and Kenny Paterson of Royal Holloway, University of London, and Juraj Somorovsky of Ruhr University, Bochum FaceTime Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to leak memory Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4366: Natalie Silvanovich of Google Project Zero FaceTime Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4367: Natalie Silvanovich of Google Project Zero Graphics Driver Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4384: Natalie Silvanovich of Google Project Zero ICU Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted string may lead to heap corruption Description: A memory corruption issue was addressed with improved input validation. CVE-2018-4394: an anonymous researcher IOHIDFamily Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4427: Pangu Team IPSec Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to gain elevated privileges Description: An out-of-bounds read was addressed with improved input validation. CVE-2018-4371: Tim Michaud (@TimGMichaud) of Leviathan Security Group Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed by removing the vulnerable code. CVE-2018-4420: Mohamed Ghannam (@_simo36) Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2018-4413: Juwei Lin (@panicaII) of TrendMicro Mobile Security Team Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2018-4419: Mohamed Ghannam (@_simo36) Messages Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted text message may lead to UI spoofing Description: An inconsistent user interface issue was addressed with improved state management. CVE-2018-4390: Rayyan Bijoora (@Bijoora) of The City School, PAF Chapter CVE-2018-4391: Rayyan Bijoora (@Bijoora) of The City School, PAF Chapter NetworkExtension Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Connecting to a VPN server may leak DNS queries to a DNS proxy Description: A logic issue was addressed with improved state management. CVE-2018-4369: an anonymous researcher Notes Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local attacker may be able to share items from the lock screen Description: A lock screen issue allowed access to the share function on a locked device. This issue was addressed by restricting options offered on a locked device. CVE-2018-4388: videosdebarraquito Safari Reader Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Enabling the Safari Reader feature on a maliciously crafted webpage may lead to universal cross site scripting Description: A logic issue was addressed with improved validation. CVE-2018-4374: Ryan Pickren (ryanpickren.com) Safari Reader Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Enabling the Safari Reader feature on a maliciously crafted webpage may lead to universal cross site scripting Description: A cross-site scripting issue existed in Safari. CVE-2018-4377: Ryan Pickren (ryanpickren.com) Security Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted S/MIME signed message may lead to a denial of service Description: A validation issue was addressed with improved logic. CVE-2018-4400: Yukinobu Nagayasu of LAC Co., Ltd. VoiceOver Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local attacker may be able to view photos from the lock screen Description: A lock screen issue allowed access to photos via Reply With Message on a locked device. CVE-2018-4387: videosdebarraquito WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Visiting a malicious website may lead to address bar spoofing Description: A logic issue was addressed with improved state management. CVE-2018-4385: an anonymous researcher WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2018-4409: Sabri Haddouche (@pwnsdx) of Wire Swiss GmbH WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to code execution Description: A memory corruption issue was addressed with improved validation. CVE-2018-4378: an anonymous researcher, zhunki of 360 ESG Codesafe Team WiFi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2018-4368: Milan Stute and Alex Mariotto of Secure Mobile Networking Lab at Technische UniversitA$?t Darmstadt Additional recognition Certificate Signing We would like to acknowledge YiAit Can YILMAZ (@yilmazcanyigit) for their assistance. iBooks We would like to acknowledge Sem VoigtlA$?nder of Fontys Hogeschool ICT for their assistance. Security We would like to acknowledge Marinos Bernitsas of Parachute for their assistance. Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 12.1". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlvYkgUpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3HpTw/7 Bkh9bUEddgGUejpnjO1DRiBlHUDQMssF7nG2LM5JOcCDoLkeHSdcr86KnR7VEyYp qSllLijO9ZzrLtJuZSEelDCi+eL1Ojk3kP/6ZeMRIxDkYItR7EFWQUK71wcInk5k qPZp2FnKU3qx0Ax7wzQi3GTQk8CZCVWcuCzh0UA0Nc3rgk0bf29+7AKmgiTaT2Ra Yo4bRIXRuyi+jE39hN4x41vwjSbaxr5EZb9rvL5HT6Idipcoc9aS+sDbsscXjz/5 9WHlwAB5mxeqO3vY5WNlLhOUXXqMVRfPC/qxQocl86r2AE9jJedQFl/p9qpG59we FrAejzKTU+1GpI4dGY6puAJval5DlcedWBxsyBxFAT04HdY0pfgF4zpFDTHRj6no HnEvtF+pNgqX2OTTLCXtMG4r5c7b1yrOPYkM6FS+BjLV2H0X9n3PpvX0qvAqSTn3 RGbkJqHFV4G/DwsWUQQOOXNCthEwhzbT2n7mc+rCtN1WPUu99fGGZusMAqetmVvl hgUIVPp9+ZHs64BlTzD+xu8e6jyoJ8YoPD9a/r+ENXxHJz6Mr8Jd/E2ZesN5tWpi sO3ajUx/d158T4jfAvIE8tJGungUgehPVIIR5120nYxHc6gMUAYzirwFptfvSpb8 HWzMnE69KcP9Lnhtgp7fRv+HKpJmrsjOLKyldZzjZlA= =cetI -----END PGP SIGNATURE----- . ------------------------------------------------------------------------ WebKitGTK+ and WPE WebKit Security Advisory WSA-2018-0008 ------------------------------------------------------------------------ Date reported : November 21, 2018 Advisory ID : WSA-2018-0008 WebKitGTK+ Advisory URL : https://webkitgtk.org/security/WSA-2018-0008.html WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2018-0008.html CVE identifiers : CVE-2018-4345, CVE-2018-4372, CVE-2018-4373, CVE-2018-4375, CVE-2018-4376, CVE-2018-4378, CVE-2018-4382, CVE-2018-4386, CVE-2018-4392, CVE-2018-4416. Several vulnerabilities were discovered in WebKitGTK+ and WPE WebKit. CVE-2018-4345 Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before 2.22.1. Credit to an anonymous researcher. A cross-site scripting issue existed in WebKit. This issue was addressed with improved URL validation. CVE-2018-4372 Versions affected: WebKitGTK+ before 2.22.4 and WPE WebKit before 2.22.2. Credit to HyungSeok Han, DongHyeon Oh, and Sang Kil Cha of KAIST Softsec Lab, Korea. Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2018-4373 Versions affected: WebKitGTK+ and WPE WebKit before 2.22.0. Credit to ngg, alippai, DirtYiCE, KT of Tresorit working with Trend Microys Zero Day Initiative. Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2018-4375 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to Yu Haiwan and Wu Hongjun From Nanyang Technological University working with Trend Micro's Zero Day Initiative. Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2018-4376 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to 010 working with Trend Micro's Zero Day Initiative. Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2018-4378 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to an anonymous researcher, zhunki of 360 ESG Codesafe Team. Processing maliciously crafted web content may lead to code execution. CVE-2018-4382 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2018-4386 Versions affected: WebKitGTK+ before 2.22.3 and WPE WebKit before 2.22.1. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2018-4392 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to zhunki of 360 ESG Codesafe Team. Processing maliciously crafted web content may lead to arbitrary code execution. CVE-2018-4416 Versions affected: WebKitGTK+ before 2.22.1 and WPE WebKit before 2.22.0. Credit to lokihardt of Google Project Zero. Processing maliciously crafted web content may lead to arbitrary code execution. We recommend updating to the latest stable versions of WebKitGTK+ and WPE WebKit. It is the best way to ensure that you are running safe versions of WebKit. Please check our websites for information about the latest stable releases. Further information about WebKitGTK+ and WPE WebKit security advisories can be found at: https://webkitgtk.org/security.html or https://wpewebkit.org/security/. The WebKitGTK+ and WPE WebKit team, November 21, 2018

Trust: 2.43

sources: NVD: CVE-2018-4392 // JVNDB: JVNDB-2018-014903 // VULHUB: VHN-134423 // VULMON: CVE-2018-4392 // PACKETSTORM: 150106 // PACKETSTORM: 150105 // PACKETSTORM: 150107 // PACKETSTORM: 150109 // PACKETSTORM: 150104 // PACKETSTORM: 150103 // PACKETSTORM: 150431

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:ltversion:12.9.1

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:12.1

Trust: 1.0

vendor:applemodel:safariscope:ltversion:12.0.1

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:7.8

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:12.1

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:5.1

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:for windows 7.8 (windows 7 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12.1 (ipad air or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12.1 (iphone 5s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12.1 (ipod touch first 6 generation )

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:for windows 12.9.1 (windows 7 or later )

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:12.1 (apple tv 4k)

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:12.1 (apple tv first 4 generation )

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:5.1 (apple watch series 1 or later )

Trust: 0.8

vendor:applemodel:icloudscope:eqversion:7.7

Trust: 0.1

vendor:applemodel:itunesscope:eqversion:12.1.3

Trust: 0.1

vendor:applemodel:itunesscope:eqversion:12.9

Trust: 0.1

vendor:applemodel:safariscope:eqversion: -

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.0b1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.0b2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0b1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.1.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.3.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.0b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.1b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.2b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.3b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.4b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.0b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.1b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.2b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.0b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.1b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.2b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.2.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.2.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.2.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.2.8

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1.8

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0.8

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.1.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:10.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:10.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:10.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:10.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:12

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.2.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.8

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:5.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:5.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:5.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.6

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.6

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.1.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.4.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.0.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.3.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.3.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.0.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2.6

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.4.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:12.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:12.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:1.0.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:1.1.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.0.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.0.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.1.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.2.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.3.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.3.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.4.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:3.0.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:3.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:3.0.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.1.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.2.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.2.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.3.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.4.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.4.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.4.3

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.4.4

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.0.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.0.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.1.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.2.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.0.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.1.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:7.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:7.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:7.0.3

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:7.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.2.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.2.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.2.6

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.3

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.4.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:12

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:12.0.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:1.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:1.0.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.0.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.2.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.2.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.2.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.1.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.1.3

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.2.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.2.3

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.0.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.2.3

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.3

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.3.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.3.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:5.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:5.0.1

Trust: 0.1

sources: VULMON: CVE-2018-4392 // JVNDB: JVNDB-2018-014903 // NVD: CVE-2018-4392

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-4392
value: HIGH

Trust: 1.0

NVD: CVE-2018-4392
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201810-1498
value: HIGH

Trust: 0.6

VULHUB: VHN-134423
value: MEDIUM

Trust: 0.1

VULMON: CVE-2018-4392
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-4392
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-134423
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-4392
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-134423 // VULMON: CVE-2018-4392 // JVNDB: JVNDB-2018-014903 // CNNVD: CNNVD-201810-1498 // NVD: CVE-2018-4392

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-134423 // JVNDB: JVNDB-2018-014903 // NVD: CVE-2018-4392

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201810-1498

TYPE

code execution, xss

Trust: 0.6

sources: PACKETSTORM: 150106 // PACKETSTORM: 150105 // PACKETSTORM: 150109 // PACKETSTORM: 150104 // PACKETSTORM: 150103 // PACKETSTORM: 150431

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-014903

PATCH

title:HT209198url:https://support.apple.com/en-us/HT209198

Trust: 0.8

title:HT209192url:https://support.apple.com/en-us/HT209192

Trust: 0.8

title:HT209194url:https://support.apple.com/en-us/HT209194

Trust: 0.8

title:HT209195url:https://support.apple.com/en-us/HT209195

Trust: 0.8

title:HT209197url:https://support.apple.com/en-us/HT209197

Trust: 0.8

title:HT209192url:https://support.apple.com/ja-jp/HT209192

Trust: 0.8

title:HT209194url:https://support.apple.com/ja-jp/HT209194

Trust: 0.8

title:HT209195url:https://support.apple.com/ja-jp/HT209195

Trust: 0.8

title:HT209197url:https://support.apple.com/ja-jp/HT209197

Trust: 0.8

title:HT209198url:https://support.apple.com/ja-jp/HT209198

Trust: 0.8

title:Multiple Apple product WebKit Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=86476

Trust: 0.6

title:Apple: Safari 12.0.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=1c1ddadf66b53045fe0d2911a2871824

Trust: 0.1

title:Apple: iTunes 12.9.1 for Windowsurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=7c7471ed217a2a07745d1e9479602210

Trust: 0.1

title:Apple: iCloud for Windows 7.8url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=5f08ec6fa9fd0c2fa8668b021247104e

Trust: 0.1

title:Apple: tvOS 12.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=d9354b498db864b176a3fafcdbeb4bd1

Trust: 0.1

title:Apple: watchOS 5.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=b42ff4ce08988ff94c6d08bc78897bf2

Trust: 0.1

title:Apple: iOS 12.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=f0a8e368c8096404df7f4474c9b1060e

Trust: 0.1

title:Superionurl:https://github.com/zhunki/Superion

Trust: 0.1

title:DRL-Guided-Fuzzingurl:https://github.com/tangsongTJU/DRL-Guided-Fuzzing

Trust: 0.1

sources: VULMON: CVE-2018-4392 // JVNDB: JVNDB-2018-014903 // CNNVD: CNNVD-201810-1498

EXTERNAL IDS

db:NVDid:CVE-2018-4392

Trust: 3.3

db:JVNid:JVNVU96365720

Trust: 0.8

db:JVNDBid:JVNDB-2018-014903

Trust: 0.8

db:CNNVDid:CNNVD-201810-1498

Trust: 0.7

db:VULHUBid:VHN-134423

Trust: 0.1

db:VULMONid:CVE-2018-4392

Trust: 0.1

db:PACKETSTORMid:150106

Trust: 0.1

db:PACKETSTORMid:150105

Trust: 0.1

db:PACKETSTORMid:150107

Trust: 0.1

db:PACKETSTORMid:150109

Trust: 0.1

db:PACKETSTORMid:150104

Trust: 0.1

db:PACKETSTORMid:150103

Trust: 0.1

db:PACKETSTORMid:150431

Trust: 0.1

sources: VULHUB: VHN-134423 // VULMON: CVE-2018-4392 // JVNDB: JVNDB-2018-014903 // PACKETSTORM: 150106 // PACKETSTORM: 150105 // PACKETSTORM: 150107 // PACKETSTORM: 150109 // PACKETSTORM: 150104 // PACKETSTORM: 150103 // PACKETSTORM: 150431 // CNNVD: CNNVD-201810-1498 // NVD: CVE-2018-4392

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2018-4392

Trust: 2.1

url:https://support.apple.com/kb/ht209192

Trust: 1.8

url:https://support.apple.com/kb/ht209194

Trust: 1.8

url:https://support.apple.com/kb/ht209195

Trust: 1.8

url:https://support.apple.com/kb/ht209196

Trust: 1.8

url:https://support.apple.com/kb/ht209197

Trust: 1.8

url:https://support.apple.com/kb/ht209198

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-4392

Trust: 0.8

url:https://jvn.jp/vu/jvnvu96365720/index.html

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-4386

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-4372

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-4378

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-4382

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-4416

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-4375

Trust: 0.6

url:https://support.apple.com/kb/ht201222

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-4376

Trust: 0.6

url:https://www.apple.com/support/security/pgp/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-4373

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2018-4377

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-4409

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-4398

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-4374

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2018-4394

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2018-4371

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4369

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4413

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4368

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2018-4400

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-4419

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-4384

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-4420

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/apple-itunes-cve-2018-4392

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/152290

Trust: 0.1

url:https://www.apple.com/itunes/download/

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://support.apple.com/ht204283

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4366

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4388

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4390

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4367

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4391

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4365

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4385

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4387

Trust: 0.1

url:https://webkitgtk.org/security/wsa-2018-0008.html

Trust: 0.1

url:https://webkitgtk.org/security.html

Trust: 0.1

url:https://wpewebkit.org/security/wsa-2018-0008.html

Trust: 0.1

url:https://wpewebkit.org/security/.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-4345

Trust: 0.1

sources: VULHUB: VHN-134423 // VULMON: CVE-2018-4392 // JVNDB: JVNDB-2018-014903 // PACKETSTORM: 150106 // PACKETSTORM: 150105 // PACKETSTORM: 150107 // PACKETSTORM: 150109 // PACKETSTORM: 150104 // PACKETSTORM: 150103 // PACKETSTORM: 150431 // CNNVD: CNNVD-201810-1498 // NVD: CVE-2018-4392

CREDITS

Apple

Trust: 0.6

sources: PACKETSTORM: 150106 // PACKETSTORM: 150105 // PACKETSTORM: 150107 // PACKETSTORM: 150109 // PACKETSTORM: 150104 // PACKETSTORM: 150103

SOURCES

db:VULHUBid:VHN-134423
db:VULMONid:CVE-2018-4392
db:JVNDBid:JVNDB-2018-014903
db:PACKETSTORMid:150106
db:PACKETSTORMid:150105
db:PACKETSTORMid:150107
db:PACKETSTORMid:150109
db:PACKETSTORMid:150104
db:PACKETSTORMid:150103
db:PACKETSTORMid:150431
db:CNNVDid:CNNVD-201810-1498
db:NVDid:CVE-2018-4392

LAST UPDATE DATE

2024-11-27T21:26:16.289000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-134423date:2019-04-05T00:00:00
db:VULMONid:CVE-2018-4392date:2019-04-05T00:00:00
db:JVNDBid:JVNDB-2018-014903date:2019-04-17T00:00:00
db:CNNVDid:CNNVD-201810-1498date:2019-04-10T00:00:00
db:NVDid:CVE-2018-4392date:2024-11-21T04:07:19.450

SOURCES RELEASE DATE

db:VULHUBid:VHN-134423date:2019-04-03T00:00:00
db:VULMONid:CVE-2018-4392date:2019-04-03T00:00:00
db:JVNDBid:JVNDB-2018-014903date:2019-04-17T00:00:00
db:PACKETSTORMid:150106date:2018-10-31T15:49:44
db:PACKETSTORMid:150105date:2018-10-31T15:49:11
db:PACKETSTORMid:150107date:2018-10-31T15:49:54
db:PACKETSTORMid:150109date:2018-10-31T15:55:08
db:PACKETSTORMid:150104date:2018-10-31T15:48:57
db:PACKETSTORMid:150103date:2018-10-31T15:48:45
db:PACKETSTORMid:150431date:2018-11-22T14:44:44
db:CNNVDid:CNNVD-201810-1498date:2018-10-31T00:00:00
db:NVDid:CVE-2018-4392date:2019-04-03T18:29:12.563