ESB-2018.0248 - [Win] Apple iCloud: Execute arbitrary code/commands - Remote with user interaction 2018-01-24

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.0248
 Multiple vulnerabilities have been identified in Apple iCloud for Windows
                              24 January 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Apple iCloud
Publisher:         Apple
Operating System:  Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-4096 CVE-2018-4088 

Reference:         ESB-2018.0240
                   ESB-2018.0239
                   ESB-2018.0238
                   ESB-2018.0237
                   ESB-2018.0236

Original Bulletin: 
   https://support.apple.com/en-au/HT201222

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2018-1-23-7 iCloud for Windows 7.3

iCloud for Windows 7.3 is now available and addresses the following:

WebKit
Available for: Windows 7 and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed with
improved memory handling.
CVE-2018-4088: Jeonghoon Shin of Theori
CVE-2018-4096: found by OSS-Fuzz

Installation note:

iCloud for Windows 7.3 may be obtained from:
https://support.apple.com/HT204283

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
- -----BEGIN PGP SIGNATURE-----
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=UXIo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=umHn
-----END PGP SIGNATURE-----

« Back to bulletins