Apple Patches 22 Vulnerabilities in WebKit

Apple this week released a new set of patches to address various security flaws across its product portfolio, including 22 bugs impacting WebKit.


Most of these vulnerabilities, Apple has revealed, could be exploited for the arbitrary execution of code during the processing of maliciously crafted web content. The vulnerabilities are memory corruption issues that have been addressed with improved memory handling.


A total of 19 such flaws were addressed, along with 3 other vulnerabilities that could lead to universal cross site scripting. Also triggered by maliciously crafted web content, these vulnerabilities were addressed with improved state management.


All 22 vulnerabilities impact iOS and were addressed with the release of iOS 12.4 this week. The platform update also addresses 15 other flaws in Core Data, FaceTime, Found in Apps, Foundation, Heimdal, libxslt, Messages, Profiles, Quick Look, Siri, Telephony, UIFoundation, and Wallet.


These flaws could result in memory leaks, arbitrary code execution, unexpected application termination, the intercepting of communications between services to perform unauthorized actions, viewing sensitive information, and restricted access to websites. 


The vulnerability addressed in Telephony could allow the initiator of a phone call “to cause the recipient to answer a simultaneous Walkie-Talkie connection,” Apple explains in an advisory.


Earlier this month, the company disabled the Walkie-Talkie app on the Apple Watch after being informed that a serious vulnerability in the application could be exploited to spy on users. 


A total of 44 vulnerabilities were addressed with the release of macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra, including the aforementioned 22 bugs in WebKit.


The remaining flaws impact AppleGraphicsControl, autofs, Bluetooth, Carbon Core, Core Data, Disk Management, FaceTime, Found ..

Support the originator by clicking the read the rest link below.