First published: Tue Jan 22 2019(Updated: )
WebKit. A logic issue was addressed with improved validation.
Credit: Ryan Pickren (ryanpickren.com) Ryan Pickren (ryanpickren.com) Ryan Pickren (ryanpickren.com) Ryan Pickren (ryanpickren.com) Ryan Pickren (ryanpickren.com) product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <12.0.3 | 12.0.3 |
Apple iCloud for Windows | <7.10 | 7.10 |
Apple iTunes for Windows | <12.9.3 | 12.9.3 |
Apple tvOS | <12.1.2 | 12.1.2 |
Apple iOS | <12.1.3 | 12.1.3 |
Apple Safari | <12.0.3 | |
Apple iPhone OS | <12.1.3 | |
Apple tvOS | <12.1.2 | |
Apple iCloud | <7.10 | |
Apple iTunes | <12.9.3 | |
Microsoft Windows | ||
All of | ||
Any of | ||
Apple iCloud | <7.10 | |
Apple iTunes | <12.9.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-6229 is a vulnerability in WebKit that allows for universal cross-site scripting through malicious web content.
CVE-2019-6229 affects iOS versions up to 12.1.3, tvOS versions up to 12.1.2, Safari versions up to 12.0.3, iTunes for Windows versions up to 12.9.3, and iCloud for Windows versions up to 7.10.
CVE-2019-6229 has a severity rating of medium.
To fix the CVE-2019-6229 vulnerability, update your iOS to version 12.1.3, update your tvOS to version 12.1.2, update your Safari to version 12.0.3, update your iTunes for Windows to version 12.9.3, and update your iCloud for Windows to version 7.10.
For more information about CVE-2019-6229, you can refer to the following sources: SecurityFocus (http://www.securityfocus.com/bid/106691) and Apple Support (https://support.apple.com/HT209443).