First published: Tue Jan 22 2019(Updated: )
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A remote attacker may be able to initiate a FaceTime call causing arbitrary code execution.
Credit: natashenka Google Project Zeronatashenka Google Project Zeronatashenka Google Project Zeronatashenka Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <5.1.3 | 5.1.3 |
Apple macOS Mojave | <10.14.3 | 10.14.3 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.1.2 | 12.1.2 |
Apple iOS | <12.1.3 | 12.1.3 |
Apple iPhone OS | <12.1.3 | |
Apple Mac OS X | <10.14.3 | |
Apple Tv Os | <12.1.2 | |
Apple watchOS | <5.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2019-6224.
The severity of CVE-2019-6224 is high with a CVSS score of 8.8.
CVE-2019-6224 is a buffer overflow vulnerability in FaceTime that allows a remote attacker to execute arbitrary code.
Versions up to and excluding iOS 12.1.3 are affected by CVE-2019-6224.
You can fix CVE-2019-6224 by updating to iOS 12.1.3 or later.