Vulnerability Details : CVE-2018-4233
Public exploit exists!
An issue was discovered in certain Apple products. iOS before 11.4 is affected. Safari before 11.1.1 is affected. iCloud before 7.5 on Windows is affected. iTunes before 12.7.5 on Windows is affected. tvOS before 11.4 is affected. watchOS before 4.3.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2018-4233
Probability of exploitation activity in the next 30 days: 1.76%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2018-4233
-
Safari Proxy Object Type Confusion
Disclosure Date: 2018-03-15First seen: 2020-04-26exploit/osx/browser/safari_proxy_object_type_confusionThis module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possib -
Safari Webkit Proxy Object Type Confusion
Disclosure Date: 2018-03-15First seen: 2020-04-26exploit/apple_ios/browser/webkit_createthisThis module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possib
CVSS scores for CVE-2018-4233
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2018-4233
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-4233
-
http://www.securitytracker.com/id/1041029
Apple Safari Multiple Flaws Let Remote Users Spoof URLs, Obtain Potentially Sensitive Information, Deny Service, and Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.exploit-db.com/exploits/45998/
Safari - Proxy Object Type Confusion (Metasploit)Exploit;Third Party Advisory;VDB Entry
-
https://support.apple.com/HT208850
About the security content of tvOS 11.4 - Apple SupportVendor Advisory
-
https://support.apple.com/HT208851
About the security content of watchOS 4.3.1 - Apple SupportVendor Advisory
-
https://support.apple.com/HT208853
About the security content of iCloud for Windows 7.5 - Apple SupportVendor Advisory
-
https://support.apple.com/HT208854
About the security content of Safari 11.1.1 - Apple SupportVendor Advisory
-
https://usn.ubuntu.com/3687-1/
USN-3687-1: WebKitGTK+ vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://support.apple.com/HT208852
About the security content of iTunes 12.7.5 for Windows - Apple SupportVendor Advisory
-
https://support.apple.com/HT208848
About the security content of iOS 11.4 - Apple SupportVendor Advisory
-
https://security.gentoo.org/glsa/201808-04
WebkitGTK+: Multiple vulnerabilities (GLSA 201808-04) — Gentoo securityThird Party Advisory
-
http://packetstormsecurity.com/files/153148/Safari-Webkit-Proxy-Object-Type-Confusion.html
Safari Webkit Proxy Object Type Confusion ≈ Packet Storm
Products affected by CVE-2018-4233
- cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*