#VU16286 Memory corruption in Apple iOS - CVE-2018-4465
Published: December 6, 2018
Apple iOS
Apple Inc.
Description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to boundary error in the Disk Images component. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with elevated privileges.
Successful exploitation of the vulnerability may result in system compromise.