First published: Tue Jan 22 2019(Updated: )
A type confusion issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to break out of its sandbox.
Credit: Ian Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <5.1.3 | 5.1.3 |
Apple macOS Mojave | <10.14.3 | 10.14.3 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.1.2 | 12.1.2 |
Apple iOS | <12.1.3 | 12.1.3 |
Apple iPhone OS | <12.1.3 | |
Apple Mac OS X | <10.14.3 | |
Apple Tv Os | <12.1.2 | |
Apple watchOS | <5.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2019-6214 is high with a CVSS score of 8.6.
CVE-2019-6214 affects Apple devices running iOS 12.1.3 or earlier, macOS Mojave 10.14.3 or earlier, tvOS 12.1.2 or earlier, and watchOS 5.1.3 or earlier.
The vulnerability in CVE-2019-6214 is a type confusion issue that could allow a malicious application to break out of its sandbox.
You can fix the vulnerability in CVE-2019-6214 by updating your Apple device to iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, or watchOS 5.1.3 or later.
You can find more information about CVE-2019-6214 on the following websites: - [SecurityFocus](http://www.securityfocus.com/bid/106739) - [Apple Support - HT209443](https://support.apple.com/HT209443) - [Apple Support - HT209446](https://support.apple.com/HT209446)