First published: Mon Mar 25 2019(Updated: )
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2. Processing a maliciously crafted font may result in the disclosure of process memory.
Credit: riusksk VulWar Corp working with Trend Micro Zero Day Initiativeriusksk VulWar Corp working with Trend Micro Zero Day Initiativeriusksk VulWar Corp working with Trend Micro Zero Day Initiativeriusksk VulWar Corp working with Trend Micro Zero Day Initiative product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <12.2 | |
Apple Mac OS X | <10.14.4 | |
Apple tvOS | <12.2 | |
Apple watchOS | <5.2 | |
Apple tvOS | <12.2 | 12.2 |
Apple macOS Mojave | <10.14.4 | 10.14.4 |
Apple High Sierra | ||
Apple Sierra | ||
Apple iOS | <12.2 | 12.2 |
Apple watchOS | <5.2 | 5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2019-8517.
The severity of CVE-2019-8517 is medium with a CVSS score of 6.5.
The affected software versions include iOS up to version 12.2, macOS Mojave up to version 10.14.4, tvOS up to version 12.2, and watchOS up to version 5.2.
The vulnerability can be exploited by processing a maliciously crafted font, which may result in the disclosure of process memory.
To fix the vulnerability, it is recommended to update to iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, and watchOS 5.2 or later.