Ministero dello Sviluppo Economico

CERT Nazionale Italia - Computer Emergency Response Team

Vulnerabilità

Aggiornamenti di sicurezza per prodotti Apple (1 giugno 2018)

apple  iCloud  Safari   lunedì, 4 giugno 2018

Apple ha rilasciato aggiornamenti di sicurezza che risolvono diverse vulnerabilità in macOS, Safari e iCloud per Windows.

Apple macOS è un sistema operativo per i computer Mac. Apple Safari è un browser Web disponibile per OS X, macOS e Microsoft Windows. iCloud è il sistema SaaS di Apple basato sul cloud computing.

L’aggiornamento per macOS contiene diversi fix di sicurezza che risolvono numerose vulnerabilità, di cui alcune di gravità elevata, in OS X El Capitan 10.11.6, macOS Sierra 10.12.6 e macOS High Sierra 10.13.4. Lo sfruttamento delle più gravi tra queste vulnerabilità potrebbe consentire ad un attaccante remoto di eseguire codice arbitrario sul sistema o provocare condizioni di denial of service.

Dettagli delle vulnerabilità risolte in macOS (in Inglese):

  • An application can trigger a flaw in the Accessibility Framework component to execute arbitrary code with system privileges (CVE-2018-4196).
  • A local user can trigger an out-of-bounds memory read error in the AMD component to read portions of kernel memory (CVE-2018-4253).
  • An application can trigger a memory handling error in the ATS component to gain elevated privileges (CVE-2018-4219).
  • An application can trigger an error in the Bluetooth component to determine kernel memory layout (CVE-2018-4171).
  • An application with root privileges can trigger a device configuration error in the Firmware component to modify the EFI flash memory region (CVE-2018-4251).
  • A remote user can trigger a memory corruption error in the FontParser component to execute arbitrary code (CVE-2018-4211).
  • A sandboxed process can trigger an error in parsing entitlement plists in the Grand Central Dispatch component to bypass sandbox restrictions (CVE-2018-4229).
  • An application can trigger a input validation flaw in the Graphics Drivers component to read restricted memory (CVE-2018-4159).
  • An application can trigger a memory corruption error in the Hypervisor component to execute arbitrary code with kernel privileges (CVE-2018-4242).
  • A remote user in a privileged network position can exploit an input validation flaw in the iBooks component to spoof password prompts (CVE-2018-4202).
  • An application can trigger a input validation flaw in the Intel Graphics Driver component to read restricted memory (CVE-2018-4141).
  • An application can trigger a race condition in the IOFireWireAVC component to execute arbitrary code with kernel privileges (CVE-2018-4228).
  • An application can trigger a memory corruption error in the IOGraphics component to execute arbitrary code with kernel privileges (CVE-2018-4236).
  • An application can trigger a memory corruption error in the IOHIDFamily component to execute arbitrary code with kernel privileges (CVE-2018-4234).
  • A remote user in a privileged network position can exploit an unspecified validation flaw in the kernel component to cause denial of service conditions (CVE-2018-4249).
  • An application can trigger a buffer overflow in the the kernel component to execute arbitrary code with kernel privileges (CVE-2018-4241, CVE-2018-4243).
  • An application can trigger a logic error in the libxpc component to gain elevated privileges (CVE-2018-4237).
  • A remote user can trigger a flaw in the Mail component in the processing of S/MIME-encrypted email to obtain contents on the email (CVE-2018-4227).
  • A local user can trigger an input validation flaw in the Messages component to conduct impersonation attacks (CVE-2018-4235).
  • A remote user can send a specially crafted message to cause denial of service conditions (CVE-2018-4240).
  • An application can trigger a race condition in the NVIDIA Graphics Drivers component to execute arbitrary code with kernel privileges (CVE-2018-4230).
  • A local user can trigger a state management error in the Security component to read a persistent account identifier (CVE-2018-4223, CVE-2018-4224).
  • A remote web site can exploit a flaw in the Security component in the handling of S-MIME client certificates to track the target user (CVE-2018-4221).
  • A local user can trigger a state management error in the Security component to modify the state of the Keychain (CVE-2018-4225).
  • A local user can exploit a state management error in the Security component to view sensitive user information (CVE-2018-4226).
  • A sandboxed process can exploit a microphone access control flaw in the Speech component to bypass sandbox restrictions (CVE-2018-4184).
  • A remote user can create a specially crafted text file that, when loaded by the target user, will exploit a flaw in the UIKit component and cause denial of service conditions (CVE-2018-4198).
  • An application can trigger a memory corruption error in the Windows Server component to execute arbitrary code with system privileges (CVE-2018-4193).
  • A user can trigger a flaw in the apache_mod_php component to execute arbitrary code (CVE-2018-7584).

Si raccomanda di scaricare ed applicare gli aggiornamenti di sicurezza messi a disposizione da Apple il più presto possibile.

Per maggiori informazioni sui prodotti vulnerabili e sugli aggiornamenti disponibili è possibile consultare i seguenti bollettini di sicurezza di Apple (in Inglese):

  • HT208849 (macOS High Sierra 10.13.5, Security Update 2018-003 Sierra, Security Update 2018-003 El Capitan)
  • HT208854 (Safari 11.1.1)
  • HT208853 (iCloud for Windows 7.5)

Notizie correlate

Aggiornamenti di sicurezza per prodotti Apple (5 dicembre 2018)

6 dicembre 2018

Apple ha rilasciato aggiornamenti di sicurezza che risolvono diverse vulnerabilità in macOS, iOS, tvOS, Safari, iTunes per Windows, iCloud per Windows e Shortcuts per iOS.Leggi tutto

Aggiornamenti di sicurezza per prodotti Apple (30 ottobre 2018)

31 ottobre 2018

Apple ha rilasciato aggiornamenti di sicurezza che risolvono diverse vulnerabilità in macOS, iOS, watchOS, tvOS, Safari, iTunes per Windows e iCloud per Windows.Leggi tutto

Aggiornamento di sicurezza per Apple iOS 12

9 ottobre 2018

Apple ha rilasciato un aggiornamento di sicurezza per iOS che risolve due vulnerabilità che potrebbero consentire ad un attaccante locale di accedere ad informazioni potenzialmente sensibili.Leggi tutto