Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:89730
[Eng]
Version
2
Class
patch
ALTXid
260814
Language
Russian
Severity
Medium
Title
Обновление USN-3781-1 -- уязвимости WebKitGTK
Description
Several security issues were fixed in WebKitGTK+.
Family
unix
Platform
Ubuntu 18.04
Linux Mint 19
Product
webkit2gtk
Reference
VENDOR: USN-3781-1
VENDOR: USN-3781-1
Id:
USN-3781-1
Reference:
https://usn.ubuntu.com/3781-1/
CVE: CVE-2018-4191
CVE: CVE-2018-4191
Id:
CVE-2018-4191
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4191
Comment
: A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209108 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4197
CVE: CVE-2018-4197
Id:
CVE-2018-4197
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4197
Comment
: A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4207
CVE: CVE-2018-4207
Id:
CVE-2018-4207
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4207
Comment
: In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
20 (Improper Input Validation)
References:
https://support.apple.com/HT208694 (CONFIRM)
USN-3781-1 (UBUNTU)
GLSA-201812-04 (GENTOO)
https://support.apple.com/HT208695%2C ()
https://support.apple.com/HT208697%2C ()
https://support.apple.com/HT208696%2C ()
https://support.apple.com/HT208698%2C ()
https://support.apple.com/HT208693%2C ()
CVE: CVE-2018-4208
CVE: CVE-2018-4208
Id:
CVE-2018-4208
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4208
Comment
: In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
20 (Improper Input Validation)
References:
https://support.apple.com/HT208696 (CONFIRM)
USN-3781-1 (UBUNTU)
GLSA-201812-04 (GENTOO)
https://support.apple.com/HT208695%2C ()
https://support.apple.com/HT208694%2C ()
https://support.apple.com/HT208697%2C ()
https://support.apple.com/HT208698%2C ()
https://support.apple.com/HT208693%2C ()
CVE: CVE-2018-4209
CVE: CVE-2018-4209
Id:
CVE-2018-4209
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4209
Comment
: In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
20 (Improper Input Validation)
References:
https://support.apple.com/en-us/HT208698 (MISC)
https://support.apple.com/en-us/HT208693 (MISC)
https://support.apple.com/en-us/HT208695 (MISC)
https://support.apple.com/en-us/HT208696 (MISC)
https://support.apple.com/en-us/HT208697 (MISC)
https://support.apple.com/HT208694 (CONFIRM)
USN-3781-1 (UBUNTU)
GLSA-201812-04 (GENTOO)
https://support.apple.com/HT208695%2C ()
https://support.apple.com/HT208697%2C ()
https://support.apple.com/HT208696%2C ()
https://support.apple.com/HT208698%2C ()
https://support.apple.com/HT208693%2C ()
CVE: CVE-2018-4210
CVE: CVE-2018-4210
Id:
CVE-2018-4210
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4210
Comment
: In iOS before 11.3, Safari before 11.1, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, an array indexing issue existed in the handling of a function in javascript core. This issue was addressed with improved checks.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
129 (Improper Validation of Array Index)
References:
https://support.apple.com/HT208698 (CONFIRM)
USN-3781-1 (UBUNTU)
GLSA-201812-04 (GENTOO)
https://support.apple.com/HT208695%2C ()
https://support.apple.com/HT208694%2C ()
https://support.apple.com/HT208693%2C ()
CVE: CVE-2018-4212
CVE: CVE-2018-4212
Id:
CVE-2018-4212
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4212
Comment
: In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References:
https://support.apple.com/HT208694 (CONFIRM)
USN-3781-1 (UBUNTU)
GLSA-201812-04 (GENTOO)
https://support.apple.com/HT208695%2C ()
https://support.apple.com/HT208697%2C ()
https://support.apple.com/HT208696%2C ()
https://support.apple.com/HT208698%2C ()
https://support.apple.com/HT208693%2C ()
CVE: CVE-2018-4213
CVE: CVE-2018-4213
Id:
CVE-2018-4213
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4213
Comment
: In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
20 (Improper Input Validation)
References:
https://support.apple.com/HT208694 (CONFIRM)
USN-3781-1 (UBUNTU)
GLSA-201812-04 (GENTOO)
https://support.apple.com/HT208695%2C ()
https://support.apple.com/HT208697%2C ()
https://support.apple.com/HT208693%2Chttps://support.apple.com/HT208698%2C ()
https://support.apple.com/HT208696%2C ()
CVE: CVE-2018-4299
CVE: CVE-2018-4299
Id:
CVE-2018-4299
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4299
Comment
: Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209108 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4306
CVE: CVE-2018-4306
Id:
CVE-2018-4306
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4306
Comment
: A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4309
CVE: CVE-2018-4309
Id:
CVE-2018-4309
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4309
Comment
: A cross-site scripting issue existed in Safari. This issue was addressed with improved URL validation. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSSv3 Score:
6.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
CHANGED
Confidentiality impact:
LOW
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CWE:
79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4311
CVE: CVE-2018-4311
Id:
CVE-2018-4311
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4311
Comment
: The issue was addressed by removing origin information. This issue affected versions prior to iOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
5.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSSv3 Score:
8.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CWE:
200 (Information Exposure)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209108 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4312
CVE: CVE-2018-4312
Id:
CVE-2018-4312
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4312
Comment
: A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4314
CVE: CVE-2018-4314
Id:
CVE-2018-4314
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4314
Comment
: A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4315
CVE: CVE-2018-4315
Id:
CVE-2018-4315
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4315
Comment
: A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4316
CVE: CVE-2018-4316
Id:
CVE-2018-4316
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4316
Comment
: A memory corruption issue was addressed with improved state management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4317
CVE: CVE-2018-4317
Id:
CVE-2018-4317
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4317
Comment
: A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4318
CVE: CVE-2018-4318
Id:
CVE-2018-4318
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4318
Comment
: A use after free issue was addressed with improved memory management. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
416 (Use After Free)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4319
CVE: CVE-2018-4319
Id:
CVE-2018-4319
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4319
Comment
: A cross-origin issue existed with "iframe" elements. This was addressed with improved tracking of security origins. This issue affected versions prior to iOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
5.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N
CVSSv3 Score:
8.1
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CWE:
346 (Origin Validation Error)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209108 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4323
CVE: CVE-2018-4323
Id:
CVE-2018-4323
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4323
Comment
: Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4328
CVE: CVE-2018-4328
Id:
CVE-2018-4328
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4328
Comment
: Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4358
CVE: CVE-2018-4358
Id:
CVE-2018-4358
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4358
Comment
: Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209108 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4359
CVE: CVE-2018-4359
Id:
CVE-2018-4359
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4359
Comment
: Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
https://support.apple.com/kb/HT209141 (MISC)
https://support.apple.com/kb/HT209140 (MISC)
https://support.apple.com/kb/HT209109 (MISC)
https://support.apple.com/kb/HT209108 (MISC)
https://support.apple.com/kb/HT209107 (MISC)
https://support.apple.com/kb/HT209106 (MISC)
CVE: CVE-2018-4361
CVE: CVE-2018-4361
Id:
CVE-2018-4361
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4361
Comment
: A memory consumption issue was addressed with improved memory handling. This issue affected versions prior to iOS 12, tvOS 12, watchOS 5, Safari 12, iTunes 12.9 for Windows, iCloud for Windows 7.7.
CVSSv2 Score:
6.8
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSSv3 Score:
8.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
References:
https://support.apple.com/HT209141 (MISC)
https://support.apple.com/HT209140 (MISC)
https://support.apple.com/HT209109 (MISC)
https://support.apple.com/HT209108 (MISC)
https://support.apple.com/HT209107 (MISC)
https://support.apple.com/HT209106 (MISC)
Content available only for registered users!
ovaldb@altx-soft.com