Main
Vulnerability Database
Exploits
ID:1189 - Exploit for Memory corruption in Apple iOS - CVE-2017-6980
ID:1189 - Exploit for Memory corruption in Apple iOS - CVE-2017-6980
Published: March 18, 2020
Vulnerability identifier: #VU6568
Vulnerability risk: High
CVE-ID: CVE-2017-6980
CWE-ID: CWE-119
Exploitation vector: Remote access
Vulnerable software:
Apple iOS
Apple iOS
Link to public exploit:
Vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in the WebKit component when processing maliciously web content. A remote attacker can create a specially crafted webpage, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
The weakness exists due to boundary error in the WebKit component when processing maliciously web content. A remote attacker can create a specially crafted webpage, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability may result in system compromise.
Remediation
Update to version 10.3.2.