This was addressed with improved state management.ĬVE-2018-4438: lokihardt of Google Project Zero, Qixun Zhao of Qihoo 360 Vulcan Team Impact: Processing maliciously crafted web content may lead to arbitrary code executionĬVE-2018-4441: lokihardt of Google Project ZeroĬVE-2018-4442: lokihardt of Google Project ZeroĬVE-2018-4443: lokihardt of Google Project Zeroĭescription: A logic issue existed resulting in memory corruption. This issue was addressed by restricting options offered on a locked device. Impact: A local attacker may be able to share items from the lock screenĭescription: A lock screen issue allowed access to the share function on a locked device. The issue was addressed with improved data deletion. Impact: A user may be unable to fully delete browsing historyĭescription: "Clear History and Website Data" did not clear the history. Impact: Visiting a malicious website may lead to address bar spoofingĭescription: A logic issue was addressed with improved state management.ĬVE-2018-4440: Wenxu Wu of Tencent Security Xuanwu Lab () Impact: Visiting a malicious website may lead to user interface spoofingĭescription: A logic issue was addressed with improved validation.ĬVE-2018-4439: xisigr of Tencent's Xuanwu Lab () This was addressed with additional checks.ĬVE-2018-4436: James Seeley Joseph S. Impact: An untrusted configuration profile may be incorrectly displayed as verifiedĭescription: A certificate validation issue existed in configuration profiles. This issue was addressed with improved input validation.ĬVE-2018-4429: Victor Le Pochat of imec-DistriNet, KU Leuven Impact: Processing a maliciously crafted email may lead to user interface spoofingĭescription: A spoofing issue existed in the handling of URLs. Impact: An attacker in a privileged position may be able to perform a denial of service attackĭescription: A denial of service issue was addressed by removing the vulnerable code.ĬVE-2018-4460: Kevin Backhouse of Semmle Security Research Teamĭescription: A logic issue was addressed with improved restrictions.ĬVE-2018-4435: Jann Horn of Google Project Zero, Juwei and Junzhi Lu of TrendMicro Mobile Security Team working with Trend Micro's Zero Day Initiativeĭescription: A memory corruption issue was addressed with improved state management.ĬVE-2018-4447: Juwei and Zhengyu Dong of TrendMicro Mobile Security Team working with Trend Micro's Zero Day Initiativeĭescription: A memory corruption issue was addressed with improved input validation.ĬVE-2018-4461: Ian Beer of Google Project Zero Impact: A local user may be able to read kernel memoryĭescription: A memory initialization issue was addressed with improved memory handling.ĬVE-2018-4431: An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program University Costin Carabaș and Răzvan Deaconescu of University POLITEHNICA of Bucharest Impact: A malicious application may be able to learn information about the presence of other applications on the deviceĭescription: This issue was addressed with improved entitlements.ĬVE-2018-4446: Luke Deshotels, Jordan Beichler, and William Enck of North Carolina State This issue was addressed with improved state management. Impact: A local attacker may be able to view contacts from the lock screenĭescription: A lock screen issue allowed access to contacts on a locked device. Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A memory corruption issue was addressed with improved memory handling. Impact: A malicious application may be able to elevate privilegesĭescription: A type confusion issue was addressed with improved memory handling. Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |