#VU16299 Memory corruption in Apple iOS - CVE-2018-4441
Published: December 6, 2018 / Updated: June 17, 2021
Apple iOS
Apple Inc.
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The weakness exists due to boundary error in the Webkit component. A remote attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.