This week, Apple issued a new set of repairs to address several security defects across its product portfolio, including 22 bugs affecting WebKit.

Apple has said that a majority of these flaws could be exploited for the random implementation of code during the dispensation of spitefully crafted web content. The susceptibilities are memory corruption issues that have been addressed with better memory management.

As many as 19 such faults were addressed, along with 3 other susceptibilities that could result in universal cross site scripting. Also activated by spitefully crafted web content, these susceptibilities were addressed with improved state management.

All 22 susceptibilities affect iOS and were addressed with the release of iOS 12.4 this week. The platform update also addresses 15 other faults in Core Data, FaceTime, Found in Apps, Foundation, Heimdal, libxslt, Messages, Profiles, Quick Look, Siri, Telephony, UIFoundation, and Wallet.

These faults could lead to memory leaks, arbitrary code execution, unforeseen application expiry, the interrupting of communications between services to achieve unlawful actions, viewing sensitive information, and limited access to websites.

The susceptibility addressed in Telephony could let the initiator of a phone call cause the recipient to answer a concurrent Walkie-Talkie connection.

Earlier this month, the company incapacitated the Walkie-Talkie app on the Apple Watch after being informed that a grave susceptibility in the application could be exploited to spy on users.

A total of 44 susceptibilities were addressed with the release of macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra, including the aforementioned 22 bugs in WebKit.

Leave a Reply

Your email address will not be published. Required fields are marked *