First published: Tue Jan 22 2019(Updated: )
A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. An application may be able to execute arbitrary code with kernel privileges.
Credit: Ian Beer Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <12.1.2 | 12.1.2 |
macOS Mojave | <10.14.3 | 10.14.3 |
macOS High Sierra | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <5.1.3 | 5.1.3 |
Apple iOS and iPadOS | <12.1.3 | 12.1.3 |
iPhone OS | <12.1.3 | |
Apple iOS and macOS | <10.14.3 | |
tvOS | <12.1.2 | |
Apple iOS, iPadOS, and watchOS | <5.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2019-6213 is critical with a score of 7.8.
iOS versions up to and excluding 12.1.3, macOS Mojave versions up to and excluding 10.14.3, tvOS versions up to and excluding 12.1.2, and watchOS versions up to and excluding 5.1.3 are affected by CVE-2019-6213.
An application may be able to execute arbitrary code with kernel privileges by exploiting CVE-2019-6213.
CVE-2019-6213 was fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, and watchOS 5.1.3 with improved bounds checking.
More information about CVE-2019-6213 can be found at the following references: [SecurityFocus](http://www.securityfocus.com/bid/106739), [Apple Support - iOS](https://support.apple.com/HT209443), [Apple Support - macOS Mojave](https://support.apple.com/HT209446).