SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Multimedia)  >   Apple iTunes Vendors:   Apple
(Apple Issues Fix for Apple iTunes for Windows) Apple macOS/OS X Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service and Let Local Users Obtain Potentially Sensitive Information, Bypass Security, and Gain Elevated Privileges
SecurityTracker Alert ID:  1041035
SecurityTracker URL:  http://securitytracker.com/id/1041035
CVE Reference:   CVE-2018-4224, CVE-2018-4225, CVE-2018-4226   (Links to External Site)
Date:  Jun 3 2018
Impact:   Denial of service via network, Disclosure of system information, Execution of arbitrary code via network, User access via local system, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Apple macOS/OS X. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can cause denial of service conditions on the target system. A local user can obtain potentially sensitive information from system memory. A local user can obtain elevated privileges on the target system. A local user can bypass security restrictions. Apple iTunes is affected.

An application can trigger a flaw in the Accessibility Framework component to execute arbitrary code with system privileges [CVE-2018-4196].

A local user can trigger an out-of-bounds memory read error in the AMD component to read portions of kernel memory [CVE-2018-4253].

An application can trigger a memory handling error in the ATS component to gain elevated privileges [CVE-2018-4219].

An application can trigger an error in the Bluetooth component to determine kernel memory layout [CVE-2018-4171].

An application with root privileges can trigger a device configuration error in the Firmware component to modify the EFI flash memory region [CVE-2018-4251].

A remote user can trigger a memory corruption error in the FontParser component to execute arbitrary code [CVE-2018-4211].

A sandboxed process can trigger an error in parsing entitlement plists in the Grand Central Dispatch component to bypass sandbox restrictions [CVE-2018-4229].

An application can trigger a input validation flaw in the Graphics Drivers component to read restricted memory [CVE-2018-4159].

An application can trigger a memory corruption error in the Hypervisor component to execute arbitrary code with kernel privileges [CVE-2018-4242].

A remote user in a privileged network position can exploit an input validation flaw in the iBooks component to spoof password prompts [CVE-2018-4202].

An application can trigger a input validation flaw in the Intel Graphics Driver component to read restricted memory [CVE-2018-4141].

An application can trigger a race condition in the IOFireWireAVC component to execute arbitrary code with kernel privileges [CVE-2018-4228].

An application can trigger a memory corruption error in the IOGraphics component to execute arbitrary code with kernel privileges [CVE-2018-4236].

An application can trigger a memory corruption error in the IOHIDFamily component to execute arbitrary code with kernel privileges [CVE-2018-4234].

A remote user in a privileged network position can exploit an unspecified validation flaw in the kernel component to cause denial of service conditions [CVE-2018-4249].

An application can trigger a buffer overflow in the the kernel component to execute arbitrary code with kernel privileges [CVE-2018-4241, CVE-2018-4243].

An application can trigger a logic error in the libxpc component to gain elevated privileges [CVE-2018-4237].

A remote user can trigger a flaw in the Mail component in the processing of S/MIME-encrypted email to obtain contents on the email [CVE-2018-4227].

A local user can trigger an input validation flaw in the Messages component to conduct impersonation attacks [CVE-2018-4235].

A remote user can send a specially crafted message to cause denial of service conditions [CVE-2018-4240].

An application can trigger a race condition in the NVIDIA Graphics Drivers component to execute arbitrary code with kernel privileges [CVE-2018-4230].

A local user can trigger a state management error in the Security component to read a persistent account identifier [CVE-2018-4223, CVE-2018-4224].

A remote web site can exploit a flaw in the Security component in the handling of S-MIME client certificates to track the target user [CVE-2018-4221].

A local user can trigger a state management error in the Security component to modify the state of the Keychain [CVE-2018-4225].

A local user can exploit a state management error in the Security component to view sensitive user information [CVE-2018-4226].

A sandboxed process can exploit a microphone access control flaw in the Speech component to bypass sandbox restrictions [CVE-2018-4184].

A remote user can create a specially crafted text file that, when loaded by the target user, will exploit a flaw in the UIKit component and cause denial of service conditions [CVE-2018-4198].

An application can trigger a memory corruption error in the Windows Server component to execute arbitrary code with system privileges [CVE-2018-4193].

A user can trigger a flaw in the apache_mod_php component to execute arbitrary code [CVE-2018-7584].

Abraham Masri (@cheesecakeufo), Anurodh Pokharel of Salesforce.com, Axis and pjf of IceSword Lab of Qihoo 360, Benjamin Gnahm (@mitp0sh) of Mentor Graphics, Damian Poddebniak of Munster University of Applied Sciences, Christian Dresen of Munster University of Applied Sciences, Jens Muller of Ruhr University Bochum, Fabian Ising of Munster University of Applied Sciences, Sebastian Schinzel of Munster University of Applied Sciences, Simon Friedberger of KU Leuven, Juraj Somorovsky of Ruhr University Bochum, Jorg Schwenk of Ruhr University Bochum, G. Geshev working with Trend Micro's Zero Day Initiative, an anonymous researcher, Hunter Byrnes, Ian Beer of Google Project Zero, Jakob Rieck (@0xdead10cc) of the Security in Distributed Systems Group, University of Hamburg, Jerry Decime, Kevin Backhouse of Semmle Ltd., Markus Gaasedelen, Nick Burnett, and Patrick Biernat of Ret2 Systems, Inc working with Trend Micro's Zero Day Initiative, Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative, Maxim Goryachy and Mark Ermolov, Mohamed Ghannam (@_simo36), Proteas of Qihoo 360 Nirvan Team, Samuel Gros (@5aelo) working with Trend Micro's Zero Day Initiative, Sriram (@Sri_Hxor) of PrimeFort Pvt. Ltd, Wei Lei and Liu Yang of Nanyang Technological University, Zhuo Liang of Qihoo 360 Nirvan Team, an anonymous researcher, Zhao Qixun (@S0rryMybad) of Qihoo 360 Vulcan Team, and shrek_wzw of Qihoo 360 Nirvan Team reported these vulnerabilities.

Impact:   A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.

A remote user can cause denial of service conditions.

A local user can obtain potentially sensitive information from system memory on the target system.

A local user can obtain elevated privileges on the target system.

A local user can bypass security controls on the target system.

A remote user can spoof password prompts

Solution:   The Apple has issued a fix for CVE-2018-4224, CVE-2018-4225, and CVE-2018-4226 for Apple iTunes for Windows (12.7.5).

The Apple advisory is available at:

https://support.apple.com/kb/HT208852

Vendor URL:  support.apple.com/kb/HT208852 (Links to External Site)
Cause:   Access control error, Boundary error, Input validation error, State error
Underlying OS:  Windows (Any)

Message History:   This archive entry is a follow-up to the message listed below.
Jun 2 2018 Apple macOS/OS X Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service and Let Local Users Obtain Potentially Sensitive Information, Bypass Security, and Gain Elevated Privileges



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC