Description Preview
Overview
This vulnerability (CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer) affects the WebKit browser engine used across multiple Apple products. When exploited, an attacker can create a specially crafted website that, when visited by a victim, could trigger memory corruption in WebKit. This corruption could lead to arbitrary code execution within the context of the affected application or cause the application to crash, resulting in denial of service. The vulnerability impacts a wide range of Apple's ecosystem, including mobile devices, desktop browsers, and media applications on both Apple and Windows platforms.
Remediation
Users should update their devices and applications to the following versions or later:
- iOS: Update to version 11.2 or later
- Safari: Update to version 11.0.2 or later
- iCloud for Windows: Update to version 7.2 or later
- iTunes for Windows: Update to version 12.7.2 or later
- tvOS: Update to version 11.2 or later
- watchOS: Update to version 4.2 or later
Updates can be installed through the standard update mechanisms for each product:
- iOS devices: Settings > General > Software Update
- Safari: Apple menu > App Store > Updates
- iCloud/iTunes for Windows: Open the application and check for updates or download the latest version from Apple's website
- Apple TV: Settings > System > Software Updates
- Apple Watch: Using the Watch app on a paired iPhone
References
- Apple Security Updates for iOS 11.2: https://support.apple.com/HT208324
- Apple Security Updates for Safari 11.0.2: https://support.apple.com/HT208325
- Apple Security Updates for iCloud 7.2 for Windows: https://support.apple.com/HT208326
- Apple Security Updates for iTunes 12.7.2 for Windows: https://support.apple.com/HT208327
- Apple Security Updates for tvOS 11.2: https://support.apple.com/HT208328
- Apple Security Updates for watchOS 4.2: https://support.apple.com/HT208334
- Ubuntu Security Notice USN-3551-1: https://usn.ubuntu.com/3551-1/
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Health Care & Social AssistanceHealth Care & Social Assistance
- ManufacturingManufacturing
- Public AdministrationPublic Administration
- Educational ServicesEducational Services
- Transportation & WarehousingTransportation & Warehousing
- Retail TradeRetail Trade
- Finance and InsuranceFinance and Insurance
- UtilitiesUtilities
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- InformationInformation
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- MiningMining
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- ConstructionConstruction
- Accommodation & Food ServicesAccommodation & Food Services
- Wholesale TradeWholesale Trade
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services