all InfoSec news
A Vulnerability in Multiple Apple Products Could Allow for Arbitrary Code Execution.
Center for Internet Security - Multi-State Information Sharing and Analysis Center www.cisecurity.org
A vulnerability has been discovered in multiple Apple products which could allow for Arbitrary Code Execution. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than …
apple arbitrary code arbitrary code execution attacker code code execution context exploitation install privileges products vulnerability