First published: Mon Mar 25 2019(Updated: )
Last updated 24 July 2024
Credit: dwfault ADLab of VenustechSamuel Groß Google Project ZeroApple G. Geshev Trend Micro Zero Day Initiativefound by OSS-Fuzz product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/webkitgtk | <2.24.0 | 2.24.0 |
debian/webkit2gtk | 2.44.2-1~deb11u1 2.46.4-1~deb11u1 2.46.0-2~deb12u1 2.46.4-1~deb12u1 2.46.4-1 | |
tvOS | <12.2 | 12.2 |
Apple Mobile Safari | <12.1 | 12.1 |
Apple iOS, iPadOS, and watchOS | <12.2 | 12.2 |
Apple iCloud | <7.11 | 7.11 |
Apple iTunes | <12.9.4 | 12.9.4 |
Apple iCloud for Windows | <7.11 | |
Apple iTunes for Windows | <12.9.4 | |
Apple Mobile Safari | <12.1 | |
iStyle @cosme iPhone OS | <12.2 | |
tvOS | <12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-8524 is a vulnerability that affects Apple iOS, tvOS, Safari, iTunes for Windows, and iCloud for Windows.
CVE-2019-8524 has a severity score of 8.8 (high).
CVE-2019-8524 can be exploited by processing maliciously crafted web content, which may lead to arbitrary code execution.
CVE-2019-8524 affects iOS up to version 12.2, tvOS up to version 12.2, Safari up to version 12.1, iTunes for Windows up to version 12.9.4, and iCloud for Windows up to version 7.11.
You can find more information about CVE-2019-8524 at the following references: [Apple Support](https://support.apple.com/en-us/HT209599), [Apple Support](https://support.apple.com/en-us/HT209601), [MITRE CVE-2019-8524](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524)