First published: Mon Mar 25 2019(Updated: )
A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may result in the disclosure of process memory.
Credit: Zhunki Zhiyi Zhang 360 ESG Codesafe Team product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <12.2 | 12.2 |
Apple Mobile Safari | <12.1 | 12.1 |
Apple iOS, iPadOS, and watchOS | <12.2 | 12.2 |
Apple iOS, iPadOS, and watchOS | <5.2 | 5.2 |
Apple iCloud | <7.11 | 7.11 |
iTunes | <12.9.4 | 12.9.4 |
iCloud for Windows | <7.11 | |
iTunes | <12.9.4 | |
Apple Mobile Safari | <12.1 | |
iStyle @cosme iPhone OS | <12.2 | |
tvOS | <12.2 | |
Apple iOS, iPadOS, and watchOS | <5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2019-7292.
The severity of CVE-2019-7292 is medium.
Versions up to and excluding Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11, iOS 12.2, tvOS 12.2, and watchOS 5.2 are affected.
To fix CVE-2019-7292, update to iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, or iCloud for Windows 7.11.
You can find more information about CVE-2019-7292 at the following references: [Apple Support - HT209599](https://support.apple.com/en-us/HT209599), [Apple Support - HT209601](https://support.apple.com/en-us/HT209601), [Apple Support - HT209604](https://support.apple.com/en-us/HT209604).