First published: Mon Mar 25 2019(Updated: )
Last updated 24 July 2024
Credit: dwfault ADLab of VenustechSamuel Groß Google Project ZeroApple G. Geshev Trend Micro Zero Day Initiativefound by OSS-Fuzz product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/webkit2gtk | 2.44.2-1~deb11u1 2.46.4-1~deb11u1 2.46.0-2~deb12u1 2.46.4-1~deb12u1 2.46.4-1 | |
tvOS | <12.2 | 12.2 |
Apple Mobile Safari | <12.1 | 12.1 |
Apple iOS, iPadOS, and watchOS | <12.2 | 12.2 |
Apple iOS, iPadOS, and watchOS | <5.2 | 5.2 |
Apple iCloud | <7.11 | 7.11 |
iTunes | <12.9.4 | 12.9.4 |
iCloud for Windows | <7.11 | |
iTunes | <12.9.4 | |
Apple Mobile Safari | <12.1 | |
iStyle @cosme iPhone OS | <12.2 | |
tvOS | <12.2 | |
Apple iOS, iPadOS, and watchOS | <5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The severity of CVE-2019-8518 is critical.
CVE-2019-8518 is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11.
Processing maliciously crafted web content may lead to arbitrary code execution.
CVE-2019-8518 affects iOS up to but not including 12.2, tvOS up to but not including 12.2, watchOS up to but not including 5.2, Safari up to but not including 12.1, iTunes for Windows up to but not including 12.9.4, and iCloud for Windows up to but not including 7.11.
You can find more information about CVE-2019-8518 at the following references: [Reference 1](https://support.apple.com/en-us/HT209599), [Reference 2](https://support.apple.com/en-us/HT209601), [Reference 3](https://support.apple.com/HT209599).