Processing a maliciously crafted image may lead to arbitrary code execution. As a result, local users can obtain the same attack primitives as remote attackers by tampering with the internal database of the framework on the device.Ī buffer overflow issue was addressed with improved memory handling. The internal database of the framework is exposed to the local user if an app uses UIFileSharingEnabled and LSSupportsOpeningDocumentsInPlace properties. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.Ī SQL injection in the flutter_downloader component through 1.11.1 for iOS allows remote attackers to steal session tokens and overwrite arbitrary files inside the app's container. Processing a font file may lead to arbitrary code execution. This issue is fixed in tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Monterey 12.6.8, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Ventura 13.2, watchOS 9.3. The issue was addressed with improved handling of caches. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7. A malicious app may be able to bypass signature validation. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 16.7.Ī certificate validation issue was addressed. A local attacker may be able to elevate their privileges. This issue is fixed in iOS 16.7 and iPadOS 16.7, OS 17.0.1 and iPadOS 17.0.1, watchOS 9.6.3, macOS Ventura 13.6, macOS Monterey 12.7, watchOS 10.0.1. The issue was addressed with improved checks. Processing web content may lead to arbitrary code execution. Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 1.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |