Released December 5, 2018

Airport

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: A malicious application may be able to elevate privileges

Description: A type confusion issue was addressed with improved memory handling.

CVE-2018-4303: Mohamed Ghannam (@_simo36)

Disk Images

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2018-4465: Pangu Team

FaceTime

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: A local attacker may be able to view contacts from the lock screen

Description: A lock screen issue allowed access to contacts on a locked device. This issue was addressed with improved state management.

CVE-2018-4430: videosdebarraquito

File Provider

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: A malicious application may be able to learn information about the presence of other applications on the device

Description: This issue was addressed with improved entitlements.

CVE-2018-4446: Luke Deshotels, Jordan Beichler, and William Enck of North Carolina State

University; Costin Carabaș and Răzvan Deaconescu of University POLITEHNICA of Bucharest

Kernel

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: A local user may be able to read kernel memory

Description: A memory initialization issue was addressed with improved memory handling.

CVE-2018-4431: An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program

CVE-2018-4448: Brandon Azad

Entry added June 24, 2019

Kernel

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: An attacker in a privileged position may be able to perform a denial of service attack

Description: A denial of service issue was addressed by removing the vulnerable code.

CVE-2018-4460: Kevin Backhouse of Semmle Security Research Team

Kernel

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: A local user may be able to read kernel memory

Description: A memory initialization issue was addressed with improved memory handling.

CVE-2018-4431: An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program

Entry updated December 18, 2018

Kernel

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: A malicious application may be able to elevate privileges

Description: A logic issue was addressed with improved restrictions.

CVE-2018-4435: Jann Horn of Google Project Zero, Juwei Lin(@panicaII) and Junzhi Lu of TrendMicro Mobile Security Team working with Trend Micro's Zero Day Initiative

Entry updated December 18, 2018

Kernel

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: A memory corruption issue was addressed with improved state management.

CVE-2018-4447: Juwei Lin(@panicaII) and Zhengyu Dong of TrendMicro Mobile Security Team working with Trend Micro's Zero Day Initiative

Entry updated December 18, 2018

Kernel

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: An application may be able to execute arbitrary code with kernel privileges

Description: A memory corruption issue was addressed with improved input validation.

CVE-2018-4461: Ian Beer of Google Project Zero

LinkPresentation

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: Processing a maliciously crafted email may lead to user interface spoofing

Description: A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.

CVE-2018-4429: Victor Le Pochat of imec-DistriNet, KU Leuven

Profiles

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: An untrusted configuration profile may be incorrectly displayed as verified

Description: A certificate validation issue existed in configuration profiles. This was addressed with additional checks.

CVE-2018-4436: James Seeley @Code4iOS, Joseph S. of JJS Securities

Entry updated December 18, 2018

Safari

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: Visiting a malicious website may lead to user interface spoofing

Description: A logic issue was addressed with improved validation.

CVE-2018-4439: xisigr of Tencent's Xuanwu Lab (tencent.com)

Safari

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: Visiting a malicious website may lead to address bar spoofing

Description: A logic issue was addressed with improved state management.

CVE-2018-4440: Wenxu Wu of Tencent Security Xuanwu Lab (xlab.tencent.com)

Safari

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: A user may be unable to fully delete browsing history

Description: "Clear History and Website Data" did not clear the history. The issue was addressed with improved data deletion.

CVE-2018-4445: William Breuer

VoiceOver

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: A local attacker may be able to share items from the lock screen

Description: A lock screen issue allowed access to the share function on a locked device. This issue was addressed by restricting options offered on a locked device.

CVE-2018-4428: videosdebarraquito

Entry added January 22, 2019

WebKit

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A memory corruption issue was addressed with improved memory handling.

CVE-2018-4441: lokihardt of Google Project Zero

CVE-2018-4442: lokihardt of Google Project Zero

CVE-2018-4443: lokihardt of Google Project Zero

WebKit

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: A logic issue existed resulting in memory corruption. This was addressed with improved state management.

CVE-2018-4438: lokihardt of Google Project Zero, Qixun Zhao of Qihoo 360 Vulcan Team

Entry updated January 22, 2019

WebKit

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: Processing maliciously crafted web content may disclose sensitive user information

Description: A logic issue was addressed with improved state management.

CVE-2018-4444: James Lee (@Windowsrcer) of S2SWWW.com

Entry added April 3, 2019, updated September 17, 2019

WebKit

Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation

Impact: Processing maliciously crafted web content may lead to arbitrary code execution

Description: Multiple memory corruption issues were addressed with improved memory handling.

CVE-2018-4437: HyungSeok Han, DongHyeon Oh, and Sang Kil Cha of KAIST Softsec Lab, Korea

CVE-2018-4464: HyungSeok Han, DongHyeon Oh, and Sang Kil Cha of KAIST Softsec Lab, Korea