First published: Tue Jan 22 2019(Updated: )
WebKit. A logic issue was addressed with improved validation.
Credit: Ryan Pickren (ryanpickren.com) Ryan Pickren (ryanpickren.com) Ryan Pickren (ryanpickren.com) Ryan Pickren (ryanpickren.com) Ryan Pickren (ryanpickren.com) product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <12.1.2 | 12.1.2 |
Apple iCloud | <7.10 | 7.10 |
iTunes | <12.9.3 | 12.9.3 |
Safari | <12.0.3 | 12.0.3 |
Apple iOS and iPadOS | <12.1.3 | 12.1.3 |
Safari | <12.0.3 | |
iPhone OS | <12.1.3 | |
tvOS | <12.1.2 | |
All of | ||
Any of | ||
iCloud | <7.10 | |
iTunes | <12.9.3 | |
Microsoft Windows Operating System | ||
iCloud | <7.10 | |
iTunes | <12.9.3 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-6229 is a vulnerability in WebKit that allows for universal cross-site scripting through malicious web content.
CVE-2019-6229 affects iOS versions up to 12.1.3, tvOS versions up to 12.1.2, Safari versions up to 12.0.3, iTunes for Windows versions up to 12.9.3, and iCloud for Windows versions up to 7.10.
CVE-2019-6229 has a severity rating of medium.
To fix the CVE-2019-6229 vulnerability, update your iOS to version 12.1.3, update your tvOS to version 12.1.2, update your Safari to version 12.0.3, update your iTunes for Windows to version 12.9.3, and update your iCloud for Windows to version 7.10.
For more information about CVE-2019-6229, you can refer to the following sources: SecurityFocus (http://www.securityfocus.com/bid/106691) and Apple Support (https://support.apple.com/HT209443).