Impact: A local user may be able to read arbitrary files as rootĬVE-2018-4181: Eric Rafaloff and John Dunlap of Gotham Digital Science This issue was addressed with improved access restrictions.ĬVE-2018-4180: Dan Bastone of Gotham Digital Science Impact: A local process may modify other processes without entitlement checksĭescription: An issue existed in CUPS. Impact: Processing maliciously crafted web content may lead to arbitrary code executionĬVE-2018-4194: Jihui Lu of Tencent KeenLab, Yu Zhou of Ant-financial Light-Year Security Lab This issue was addressed with improved object management.ĬVE-2018-4171: shrek_wzw of Qihoo 360 Nirvan Team Impact: A malicious application may be able to determine kernel memory layout.ĭescription: An information disclosure issue existed in device properties. This issue was addressed with improved input validation.ĬVE-2018-5383: Lior Neumann and Eli BihamĪvailable for: OS X El Capitan 10.11.6, macOS Sierra 10.12.6 Impact: An attacker in a privileged network position may be able to intercept Bluetooth trafficĭescription: An input validation issue existed in Bluetooth. Impact: A malicious application may be able to elevate privilegesĭescription: A type confusion issue was addressed with improved memory handling.ĬVE-2018-4219: Mohamed Ghannam for: MacBook Pro (Retina, 15-inch, Mid 2015), MacBook Pro (Retina, 15-inch, 2015), MacBook Pro (Retina, 13-inch, Early 2015), MacBook Pro (15-inch, 2017), MacBook Pro (15-inch, 2016), MacBook Pro (13-inch, Late 2016, Two Thunderbolt 3 Ports), MacBook Pro (13-inch, Late 2016, Four Thunderbolt 3 Ports), MacBook Pro (13-inch, 2017, Four Thunderbolt 3 Ports), MacBook (Retina, 12-inch, Early 2016), MacBook (Retina, 12-inch, Early 2015), MacBook (Retina, 12-inch, 2017), iMac Pro, iMac (Retina 5K, 27-inch, Late 2015), iMac (Retina 5K, 27-inch, 2017), iMac (Retina 4K, 21.5-inch, Late 2015), iMac (Retina 4K, 21.5-inch, 2017), iMac (21.5-inch, Late 2015), and iMac (21.5-inch, 2017) Impact: Issues in php were addressed in this updateĭescription: This issue was addressed by updating to php version 7.1.16.ĬVE-2018-7584: Wei Lei and Liu Yang of Nanyang Technological University This issue was addressed with improved input validation.ĬVE-2018-4254: shrek_wzw of Qihoo 360 Nirvan Teamĭescription: A buffer overflow was addressed with improved bounds checking.ĬVE-2018-4258: shrek_wzw of Qihoo 360 Nirvan Teamĭescription: A buffer overflow was addressed with improved size validation.ĬVE-2018-4257: shrek_wzw of Qihoo 360 Nirvan Team Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: An input validation issue existed in the kernel. This was addressed with improved input validation.ĬVE-2018-4253: shrek_wzw of Qihoo 360 Nirvan Teamĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2018-4256: shrek_wzw of Qihoo 360 Nirvan TeamĬVE-2018-4255: shrek_wzw of Qihoo 360 Nirvan TeamĮntry added October 18, 2018, updated December 14, 2018 Impact: A local user may be able to read kernel memoryĭescription: An out-of-bounds read issue existed that led to the disclosure of kernel memory. This issue was addressed with improved memory management.ĬVE-2018-4196: Alex Plaskett, Georgi Geshev and Fabian Beterke of MWR Labs working with Trend Micro’s Zero Day Initiative, and WanderingGlitch of Trend Micro Zero Day Initiative Impact: A malicious application may be able to execute arbitrary code with system privilegesĭescription: An information disclosure issue existed in Accessibility Framework.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |