#VU16288 Memory corruption in Apple iOS - CVE-2018-4461
Published: December 6, 2018
Apple iOS
Apple Inc.
Description
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The weakness exists due to boundary error in the Kernel component. A local attacker can run a specially crafted application, trigger memory corruption and execute arbitrary code with kernel privileges.
Successful exploitation of the vulnerability may result in system compromise.