| Vulnerability Name: | CVE-2018-4241 (CCN-144486) | ||||||||||||
| Assigned: | 2018-05-29 | ||||||||||||
| Published: | 2018-05-29 | ||||||||||||
| Updated: | 2018-07-17 | ||||||||||||
| Summary: | An issue was discovered in certain Apple products. iOS before 11.4 is affected. macOS before 10.13.5 is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "Kernel" component. A buffer overflow in mptcp_usr_connectx allows attackers to execute arbitrary code in a privileged context via a crafted app. | ||||||||||||
| CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.2 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
7.2 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-4241 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1041027 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://bugs.chromium.org/p/project-zero/issues/detail?id=1558 Source: CCN Type: Google Security Research Issue 1558 XNU kernel heap overflow due to bad bounds checking in MPTCP Source: XF Type: UNKNOWN appleios-cve20184241-bo(144486) Source: CCN Type: Packet Storm Security [06-05-2018] XNU Kernel MPTCP Head Overflow Source: CCN Type: Apple security document HT208848 About the security content of iOS 11.4 Source: CCN Type: Apple security document HT208850 About the security content of tvOS 11.4 Source: CCN Type: Apple security document HT208851 About the security content of watchOS 4.3.1 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208848 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208849 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208850 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT208851 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [06-06-2018] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory, VDB Entry 44849 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||