SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Multimedia)  >   Apple TV Vendors:   Apple
(Apple Issues Fix for Apple TV) Apple iOS Mulitple Bugs Let Remote and Local Users Gain Potentially Sensitive Information, Local Users Gain Elevated Privileges, and Remote Users Spoof Content
SecurityTracker Alert ID:  1041668
SecurityTracker URL:  http://securitytracker.com/id/1041668
CVE Reference:   CVE-2018-4305, CVE-2018-4313, CVE-2018-4363   (Links to External Site)
Date:  Sep 17 2018
Impact:   Disclosure of system information, Disclosure of user information, Modification of user information, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   Multiple vulnerabilities were reported in Apple iOS. A remote or local user can obtain potentially sensitive information. A local user can obtain elevated privileges on the target system. A remote user can spoof content. Apple TV is affected.

An application can trigger a flaw in the Accounts component to read a persistent account identifier [CVE-2018-4322].

A remote user in a privileged network position can intercept Bluetooth network traffic [CVE-2018-5383]. The 12.9-inch iPad Pro 2nd generation, 10.5-inch iPad Pro, 9.7-inch iPad Pro, iPad 5th generation, and iPod Touch 6th generations are affected.

An application can trigger a memory corruption error in the Core Bluetooth component to execute arbitrary code with system privileges [CVE-2018-4330].

An application can trigger a input validation flaw in the IOMobileFrameBuffer component to read restricted memory [CVE-2018-4335].

An application can trigger a permissions error in the CoreMedia component to gain camera access [CVE-2018-4356].

A remote user in a privileged network position can trigger a validation flaw in the iTunes Store component to spoof password prompts [CVE-2018-4305].

An application can trigger a flaw in the kernel component to read restricted memory [CVE-2018-4363].

A local user can trigger an application snapshot error in the Messages component to discover a user's deleted messages [CVE-2018-4313].

A local user can trigger an application snapshot error flaw in the Notes component to discover a user's deleted notes [CVE-2018-4352].

A remote user can create a specially crafted website that, when loaded by the target user, will trigger a flaw in the SafariViewController component to spoof the address [CVE-2018-4362].

A physically local user can trigger a logic error in the Status Bar component to determine the last used app from the lock screen [CVE-2018-4325].

An application can trigger a input validation flaw in the Wi-Fi component to read restricted memory [CVE-2018-4338].

Some anonymous researchers, David Scott, Enes Mert Ulu of Abdullah Murside Ozunenek Anadolu Lisesi - Ankara/Turkiye, Mehmet Ferit Dastan of Van Yuzunci Yil University, Metin Altug Karakaya of Kaliptus Medical Organization, Vinodh Swami of Western Governor's University (WGU), Brandon Azad, Brian Adeloye, Ian Beer of Google Project Zero, Jerry Decime, Jun Kokatsu (@shhnjk), Lee @ SECLAB, Yonsei University, (via Trend Micro's Zero Day Initiative), Lior Neumann and Eli Biham, Min (Spark) Zheng, and Xiaolong Bai of Alibaba Inc. reported these vulnerabilities.

Impact:   A remote or local user can obtain potentially sensitive information.

A local user can obtain elevated privileges on the target system.

A remote user can spoof content.

Solution:   Apple has issued a fix for CVE-2018-4305, CVE-2018-4313, and CVE-2018-4363 for Apple TV (12.0).

The Apple advisory is available at:

https://support.apple.com/en-us/HT209107

Vendor URL:  support.apple.com/en-us/HT209107 (Links to External Site)
Cause:   Access control error, Authentication error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Sep 17 2018 Apple iOS Mulitple Bugs Let Remote and Local Users Gain Potentially Sensitive Information, Local Users Gain Elevated Privileges, and Remote Users Spoof Content



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC