Multiple vulnerabilities in Apple iOS
Original Issue Date: September 26, 2017
Severity Rating: High
- Apple iOS versions prior to 11.0
Multiple vulnerabilities have been reported in Apple iOS which could allow a attacker to execute arbitrary code, spoof browser address bar, conduct cross site scripting, cause a denial of service (DoS) conditions or gain sensitive information and elevated privileges on the affected system.
These vulnerabilities are caused due to multiple memory corruption issues, improper input validation, improper memory handling, and improper permission validation in various components within Webkit and various other components.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, spoof browser address bar, bypass security restrictions, conduct cross site scripting, cause a denial of service (DoS) conditions or gain sensitive information and gain elevated privileges on the affected system.
Apply appropriate security updates as mentioned in the
Apple Security Advisory HT208112
The information provided herein is on "as is" basis, without warranty of any kind.
Email: firstname.lastname@example.org Phone: +91-11-24368572
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
6, CGO Complex, Lodhi Road,
New Delhi - 110 003