Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-4407 PoC — 多款Apple产品 Kernel 缓冲区错误漏洞

Source
Associated Vulnerability
Title:多款Apple产品 Kernel 缓冲区错误漏洞 (CVE-2018-4407)
Description:A memory corruption issue was addressed with improved validation. This issue affected versions prior to iOS 12, macOS Mojave 10.14, tvOS 12, watchOS 5.
Description
Crashes any macOS High Sierra or iOS 11 device that is on the same WiFi network
Readme
# Apple-Remote-Crash-Tool-CVE-2018-4407
Crashes any macOS High Sierra or iOS 11 device that is on the same WiFi network

Just a small Tool that uses a public 'heap buffer overflow vulnerability' (CVE-2018-4407) and makes it easier to exploit whole networks.


## Requirements
- MacOS
- Python installed
- Scapy installed (`pip install scapy`)

## Basics
Sends a malicious ICMP packet to the IP address of the target device

## Works on
- Apple iOS 11 and earlier: all devices (upgrade to iOS 12)
- Apple macOS High Sierra, up to and including 10.13.6: all devices (patched in  security update 2018-001 )
- Apple macOS Sierra, up to and including 10.12.6: all devices (patched in  security update 2018-005 )
- Apple OS X El Capitan and earlier: all devices

## Notes
- Port Feature is useless
- Network Scan only adds Devices from the ARP cache (devices that the mac communicated with since last reboot)  
A short networkscan with any IP Scanner is recommended before pressing the button

## Features

**Extra Ping Methods:**  
Sometimes Devices don't react to the malicious packet. That is fixed when it recieves a valid ICMP packet (ping) before


- Extra Ping Method 1:  
Concurrently pings alls devices in the Background (only for a couple of IPs! - With more IPs, nothing works)

- Extra Ping Method 2:  
Pings every Device once before sending the malicious ICMP packet (might be slow)

## Screenshot
![alt text](https://raw.githubusercontent.com/anonymouz4/Apple-Remote-Crash-Tool-CVE-2018-4407/master/Screenshot.png)
File Snapshot

[4.0K] /data/pocs/8105f9a656fd777bd749d9426b47e88f28be3be8 ├── [4.3M] ExploitTest.app.zip ├── [1.5K] README.md └── [479K] Screenshot.png 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →