iOS and macOS suffered from a wifi proximity kernel double-free vulnerability in AWDL BSS Steering.
cdd1c47241bd866a69b6c59cc0b23828
A remote iOS / macOS heap corruption issue exists due to insufficient bounds checking in AWDL.
bf5b45700458564cfc6029e73e8906ec
The Samsung kernel suffers from a heap out-of-bounds write in /dev/tsmux.
00005339bd5f67a8a2ca1f91df549119
XPC fast path fails to ensure NULL termination of XPC strings, leading to memory disclosure and corruption vulnerabilities in XPC services.
0f1657d7f62dc322829fee09424c0e5c
launchd on macOS and iOS suffer from a memory corruption issue due to a lack of bounds checking when parsing XPC messages.
1214e0a3adca8432caea6990153f7571
An insufficient fix for CVE-2019-6205 means XNU vm_map_copy optimization which requires atomicity still is not atomic.
f8e6dfd4187cd8bfbcbdada394e14738
iOS suffers from a sandbox escape vulnerability due to an integer overflow in mediaserverd.
2596a26960f328e0ae84af2d60d2f0d1
This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233). The type confusion leads to the ability to allocate fake Javascript objects, as well as the ability to find the address in memory of a Javascript object. This allows us to construct a fake JSCell object that can be used to read and write arbitrary memory from Javascript. The module then uses a ROP chain to write the first stage shellcode into executable memory within the Safari process and kick off its execution. The first stage maps the second stage macho (containing CVE-2017-13861) into executable memory, and jumps to its entrypoint. The CVE-2017-13861 async_wake exploit leads to a kernel task port (TFP0) that can read and write arbitrary kernel memory. The processes credential and sandbox structure in the kernel is overwritten and the meterpreter payloads code signature hash is added to the kernels trust cache, allowing Safari to load and execute the (self-signed) meterpreter payload.
394148cda471deeb3abbfdccf622fa46
iOS and MacOS suffer from a kernel heap overflow in PF_KEY due to lack of bounds checking when retrieving statistics.
09930d55fbbd4be1e53ae5ebe0b2a4bf
XNU vm_map_copy optimization which requires atomicity is not atomic. This violates the semantics of mach message OOL memory, and leads to TOCTOU issues which can lead to memory corruption.
de2284e251a10f0384f76a0857085c48
iOS and MacOS suffers from sandbox escape vulnerabilities due to type confusions and memory safety issues in iohideventsystem.
182ae62c76265741d73f711225502a7f
libxpc on MacOS version 10.14.1 suffers from an arbitrary mach port name deallocation in XPC services due to invalid mach message parsing in _xpc_serializer_unpack.
5aaf10f078ba260537df0d15456c6e15
The Apple Intel GPU driver suffers from use-after-free and double-delete issues due to bad locking.
b351e27cbcb6569d7e176048b1d1639f
iOS and macOS suffers from a sandbox escape due to trusted length field in shared memory used by the HID event subsystem.
d02085ca3eebe96590a6bfad12954bf6
iOS suffers from a kernel stack memory disclosure due to failure to check copyin return value.
dabae5d2d2f7dfbc02093d00e56e96e6
iOS and macOS suffer from a sandbox escape vulnerability due to failure to comply with MIG object lifetime semantics in the iohideventsystem_client subsystem.
b9de50e80a2ea80f7f9468bd16b597e3
iOS and macOS suffer from sandbox escape vulnerabilities due to MIG failing to use correct out-of-line descriptor lengths when parsing reply messages.
4f22a8f810b85991d35e76ab7b9861b4
iOS and macOS suffers from a kernel memory corruption vulnerability due to integer overflow in IOHIDResourceQueue::enqueueReport.
eaf771ae19474d20de705e51b77b51d3
iOS and macOS suffers from a sandbox escape vulnerability due to mach message sent from shared memory.
212667e2b57588da87c0742e251ac563
The iOS kernel suffers from a use-after-free vulnerability due to bad error handling in personas.
00aa8ae882f2b6020f3e4a12749da1ee
The macOS and iOS kernels suffer from a heap overflow due to a lack of lower size check in getvolattrlist.
8bc2ddee4be107c0fed7f5978e377f2c
The XNU kernel suffers from a heap overflow vulnerability due to bad bounds checking in MPTCP.
449d61519abf2905830578f282b2544c
The macOS kernel suffers from a use-after-free vulnerability due to a lack of locking in the nvidia GeForce driver.
9df96b20c281d23bcd8105e681608b33
macOS suffers from a double mach_port_deallocate in kextd due to failure to comply with MIG ownership rules.
3ed950f3129994df12395fa85baf3812
macOS/iOS ReportCrash suffers from a mach port replacement due to failure to respect MIG ownership rules.
afd5e9434d99e4e48e8d1ec634a2c115