#VU15587 Memory corruption in macOS - CVE-2018-4410
Published: October 31, 2018
macOS
Apple Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in AppleGraphicsControl component when handling malicious input. A remote attacker can trick the victim into processing a specially crafted input, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.