6.8
CVSSv2

CVE-2018-4121

Published: 03/04/2018 Updated: 08/03/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 686
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An issue exists in certain Apple products. iOS prior to 11.3 is affected. Safari prior to 11.1 is affected. iCloud prior to 7.4 on Windows is affected. iTunes prior to 12.7.4 on Windows is affected. tvOS prior to 11.3 is affected. watchOS prior to 4.3 is affected. The issue involves the "WebKit" component. It allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.

Vulnerable Product Search on Vulmon Subscribe to Product

apple safari

apple watchos

apple tvos

apple iphone os

apple icloud

apple itunes

Vendor Advisories

An issue was discovered in certain Apple products iOS before 113 is affected Safari before 111 is affected iCloud before 74 on Windows is affected iTunes before 1274 on Windows is affected tvOS before 113 is affected watchOS before 43 is affected The issue involves the "WebKit" component It allows remote attackers to execute arbitrar ...

Exploits

When a WebAssembly binary is parsed in ModuleParser::parse, it is expected to contain certain sections in a certain order, but can also contain custom sections that can appear anywhere in the binary The ordering check validateOrder() does not adequately check that sections are in the correct order when a binary contains custom sections static in ...

Github Repositories

CVE-2018-4121 - Safari Wasm Sections POC RCE Exploit by MWR Labs (c) 2018 Details this proof of concept exploit targets Safari 1103 (1360456) on macOS 10133 (17D47) versions only compile the payload of your choice as a dylib with a constructor run python file_to_jsarraypy yourdylib payloadjs serve this directory and point Safari to /exploithtml exploit is not fully

CVE-2018-4121 - Safari Wasm Sections POC RCE Exploit by MWR Labs (c) 2018 Details this proof of concept exploit targets Safari 1103 (1360456) on macOS 10133 (17D47) versions only compile the payload of your choice as a dylib with a constructor run python file_to_jsarraypy yourdylib payloadjs serve this directory and point Safari to /exploithtml exploit is not fully

macOS 10.13.3 (17D47) Safari Wasm Exploit

CVE-2018-4121 - Safari Wasm Sections POC RCE Exploit by MWR Labs (c) 2018 Details this proof of concept exploit targets Safari 1103 (1360456) on macOS 10133 (17D47) versions only compile the payload of your choice as a dylib with a constructor run python file_to_jsarraypy yourdylib payloadjs serve this directory and point Safari to /exploithtml exploit is not fully