#VU6568 Memory corruption in Apple iOS - CVE-2017-6980

 

#VU6568 Memory corruption in Apple iOS - CVE-2017-6980

Published: May 16, 2017 / Updated: September 14, 2018


Vulnerability identifier: #VU6568
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber
CVE-ID: CVE-2017-6980
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Apple iOS
Software vendor:
Apple Inc.

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists due to boundary error in the WebKit component when processing maliciously web content. A remote attacker can create a specially crafted webpage, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Remediation

Update to version 10.3.2.

External links