First published: Wed Sep 12 2018(Updated: )
CFNetwork. A memory corruption issue was addressed with improved memory handling.
Credit: Bruno Keith @bkth_ Trend Micro's Zero Day InitiativeBruno Keith @bkth_ Trend Micro product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <12 | 12 |
macOS Mojave | <10.14.1 | 10.14.1 |
macOS High Sierra | ||
macOS High Sierra | ||
macOS Mojave | <10.14 | 10.14 |
Apple iOS, iPadOS, and watchOS | <12 | 12 |
Apple iOS, iPadOS, and watchOS | <5 | 5 |
iOS | <12.0 | |
Apple iOS and macOS | <10.14 | |
tvOS | <12 | |
Apple iOS, iPadOS, and watchOS | <5.0 | |
Apple iCloud for Windows | <7.7 | |
Apple iTunes for Windows | <12.9 | |
Microsoft Windows | ||
Apple iCloud | <7.7 | 7.7 |
Apple iTunes | <12.9 | 12.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2018-4126 is critical.
The affected software versions are iOS versions prior to 12, macOS Mojave versions prior to 10.14.1, tvOS versions prior to 12, watchOS versions prior to 5, iTunes for Windows versions prior to 12.9, and iCloud for Windows versions prior to 7.7.
To fix CVE-2018-4126, update to iOS 12, macOS Mojave 10.14.1, tvOS 12, watchOS 5, iTunes 12.9 for Windows, or iCloud for Windows 7.7.
You can find more information about CVE-2018-4126 on the Apple support website at the following links: [link1](https://support.apple.com/en-us/HT209193), [link2](https://support.apple.com/kb/HT209106), [link3](https://support.apple.com/kb/HT209107).
The CWE identifier for CVE-2018-4126 is CWE-119.