Impact
The vulnerability stems from improper memory handling in WebKitGTK, leading to a crash when a user processes maliciously crafted web content. The crash results in a denial of service, disrupting user experience and potentially causing instability in the Safari browser on supported Apple platforms. The weakness is categorized as CWE-119 (Buffer Overflow) and CWE-400 (Resource Exhaustion).
Affected Systems
Apple Safari, iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are impacted. The fix is included in Safari 18.4, iOS 18.4, iPadOS 18.4, iPadOS 17.7.6, macOS Sequoia 15.4, tvOS 18.4, visionOS 2.4, and watchOS 11.4.
Risk and Exploitability
Based on the description, it is inferred that the likely attack vector involves delivering a malicious web page that is loaded in Safari or a WebKit-based browser, a scenario consistent with drive-by or phishing attacks. This vulnerability carries a CVSS score of 9.8, indicating a high severity. The EPSS score of <1 % suggests a very low but non-zero likelihood of exploitation. It is not listed in the CISA KEV catalog. The impact is a denial of service rather than remote code execution or data theft.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN