macOS High Sierra 10.13.3 & iOS 11.2.5 released

Apple was busy today, the update for macOS High Sierra fixes several security holes, iOS also fixes some possible holes. Both updates are only bugfix releases, there is no new option added related to the recently battery scandal. Apple promised to introduce a new option for this, but we got nothing (yet).

img-0005-306x205

I did some research on the official Apple pages and there is nothing mentioned from Meltdown & Spectre which is strange because I expect from a bugfix release that it at least mention something about the biggest hardware hole ever.

iOS 11.2.5


Audio

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution
  • Description: A memory corruption issue was addressed through improved input validation.
  • CVE-2018-4094: Mingi Cho, MinSik Shin, Seoyoung Kim, Yeongho Lee and Taekyoung Kwon of the Information Security Lab, Yonsei University

Core Bluetooth

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: An application may be able to execute arbitrary code with system privileges
  • Description: A memory corruption issue was addressed with improved memory handling.
  • CVE-2018-4087: Rani Idan (@raniXCH) of Zimperium zLabs Team
  • CVE-2018-4095: Rani Idan (@raniXCH) of Zimperium zLabs Team

Kernel

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: An application may be able to read restricted memory
  • Description: A memory initialization issue was addressed through improved memory handling.
  • CVE-2018-4090: Jann Horn of Google Project Zero

Kernel

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: An application may be able to read restricted memory
  • Description: A race condition was addressed through improved locking.
  • CVE-2018-4092: an anonymous researcher

Kernel

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: A malicious application may be able to execute arbitrary code with kernel privileges
  • Description: A memory corruption issue was addressed through improved input validation.
  • CVE-2018-4082: Russ Cox of Google

Kernel

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: An application may be able to read restricted memory
  • Description: A validation issue was addressed with improved input sanitization.
  • CVE-2018-4093: Jann Horn of Google Project Zero

LinkPresentation

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: Processing a maliciously crafted text message may lead to application denial of service
  • Description: A resource exhaustion issue was addressed through improved input validation.
  • CVE-2018-4100: Abraham Masri (@cheesecakeufo)

QuartzCore

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to arbitrary code execution
  • Description: A memory corruption issue existed in the processing of web content. This issue was addressed through improved input validation.
  • CVE-2018-4085: Ret2 Systems Inc. working with Trend Micro’s Zero Day Initiative

Security

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: A certificate may have name constraints applied incorrectly
  • Description: A certificate evaluation issue existed in the handling of name constraints. This issue was addressed through improved trust evaluation of certificates.
  • CVE-2018-4086: Ian Haken of Netflix

WebKit

  • Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation
  • Impact: Processing maliciously crafted web content may lead to arbitrary code execution
  • Description: Multiple memory corruption issues were addressed with improved memory handling.
  • CVE-2018-4088: Jeonghoon Shin of Theori
  • CVE-2018-4089: Ivan Fratric of Google Project Zero
  • CVE-2018-4096: found by OSS-Fuzz

macOS High Sierra 10.13.3


Audio

  • Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6
  • Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution
  • Description: A memory corruption issue was addressed through improved input validation.
  • CVE-2018-4094: Mingi Cho, MinSik Shin, Seoyoung Kim, Yeongho Lee and Taekyoung Kwon of the Information Security Lab, Yonsei University

curl

  • Available for: macOS High Sierra 10.13.2
  • Impact: Multiple issues in curl
  • Description: An out-of-bounds read issue existed in the curl. This issue was addressed through improved bounds checking.
  • CVE-2017-8817: found by OSS-Fuzz

IOHIDFamily

  • Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
  • Impact: An application may be able to execute arbitrary code with kernel privileges
  • Description: A memory corruption issue was addressed with improved memory handling.
  • CVE-2018-4098: Siguza

Kernel

  • Available for: macOS Sierra 10.12.6, OS X El Capitan 10.11.6
  • Impact: An application may be able to read kernel memory (Meltdown)
  • Description: Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
  • CVE-2017-5754: Jann Horn of Google Project Zero; Moritz Lipp of Graz University of Technology; Michael Schwarz of Graz University of Technology; Daniel Gruss of Graz University of Technology; Thomas Prescher of Cyberus Technology GmbH; Werner Haas of Cyberus Technology GmbH; Stefan Mangard of Graz University of Technology; Paul Kocher; Daniel Genkin of University of Pennsylvania and University of Maryland; Yuval Yarom of University of Adelaide and Data61; and Mike Hamburg of Rambus (Cryptography Research Division)

Kernel

  • Available for: macOS High Sierra 10.13.2
  • Impact: An application may be able to read restricted memory
  • Description: A memory initialization issue was addressed through improved memory handling.
  • CVE-2018-4090: Jann Horn of Google Project Zero

Kernel

  • Available for: macOS High Sierra 10.13.2
  • Impact: An application may be able to read restricted memory
  • Description: A race condition was addressed through improved locking.
  • CVE-2018-4092: an anonymous researcher

Kernel

  • Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
  • Impact: A malicious application may be able to execute arbitrary code with kernel privileges
  • Description: A memory corruption issue was addressed through improved input validation.
  • CVE-2018-4082: Russ Cox of Google

Kernel

  • Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6
  • Impact: An application may be able to execute arbitrary code with kernel privileges
  • Description: A logic issue was addressed with improved validation.
  • CVE-2018-4097: Resecurity, Inc.

Kernel

  • Available for: macOS High Sierra 10.13.2
  • Impact: An application may be able to read restricted memory
  • Description: A validation issue was addressed with improved input sanitization.
  • CVE-2018-4093: Jann Horn of Google Project Zero

LinkPresentation

  • Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6.2
  • Impact: Processing a maliciously crafted text message may lead to application denial of service
  • Description: A resource exhaustion issue was addressed through improved input validation.
  • CVE-2018-4100: Abraham Masri (@cheesecakeufo)

QuartzCore

  • Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
  • Impact: Processing maliciously crafted web content may lead to arbitrary code execution
  • Description: A memory corruption issue existed in the processing of web content. This issue was addressed through improved input validation.
  • CVE-2018-4085: Ret2 Systems Inc. working with Trend Micro’s Zero Day Initiative

Sandbox

  • Available for: macOS High Sierra 10.13.2
  • Impact: A sandboxed process may be able to circumvent sandbox restrictions
  • Description: An access issue was addressed through additional sandbox restrictions.
  • CVE-2018-4091: Alex Gaynor of Mozilla

Security

  • Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6
  • Impact: A certificate may have name constraints applied incorrectly
  • Description: A certificate evaluation issue existed in the handling of name constraints. This issue was addressed through improved trust evaluation of certificates.
  • CVE-2018-4086: Ian Haken of Netflix

WebKit

  • Available for: macOS High Sierra 10.13.2
  • Impact: Processing maliciously crafted web content may lead to arbitrary code execution
  • Description: Multiple memory corruption issues were addressed with improved memory handling.
  • CVE-2018-4088: Jeonghoon Shin of Theori
  • CVE-2018-4089: Ivan Fratric of Google Project Zero
  • CVE-2018-4096: found by OSS-Fuzz

Wi-Fi

  • Available for: macOS High Sierra 10.13.2, macOS Sierra 10.12.6, OS X El Capitan 10.11.6
  • Impact: An application may be able to read restricted memory
  • Description: A validation issue was addressed with improved input sanitization.
  • CVE-2018-4084: Hyung Sup Lee of Minionz, You Chan Lee of Hanyang University

Research

  • ‘We want to help America,’ Apple CEO Tim Cook says of moving foreign money back to US (abcnews.go.com)

 

Advertisements

One thought on “macOS High Sierra 10.13.3 & iOS 11.2.5 released

Comments are closed.

Blog at WordPress.com.

Up ↑

%d bloggers like this: