First published: Mon May 13 2019(Updated: )
SQLite. An input validation issue was addressed with improved memory handling.
Credit: Omer Gull Checkpoint ResearchOmer Gull Checkpoint ResearchOmer Gull Checkpoint ResearchOmer Gull Checkpoint ResearchOmer Gull Checkpoint Research product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <12.3 | 12.3 |
macOS Mojave | <10.14.5 | 10.14.5 |
macOS High Sierra | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <12.3 | 12.3 |
Apple iOS, iPadOS, and watchOS | <5.2.1 | 5.2.1 |
Apple iTunes | <12.9.5 | 12.9.5 |
Apple iCloud for Windows | <7.12 | |
Apple iCloud for Windows | >=10.0<10.4 | |
Apple iTunes for Windows | <12.9.5 | |
Apple Mobile Safari | <12.1.1 | |
iStyle @cosme iPhone OS | <12.3 | |
Apple iOS and macOS | <10.14.5 | |
tvOS | <12.3 | |
Apple iOS, iPadOS, and watchOS | <5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2019-8577.
The severity of CVE-2019-8577 is high (CVSS score 7.8).
The affected software versions are iOS up to version 12.3, macOS Mojave up to version 10.14.5, tvOS up to version 12.3, watchOS up to version 5.2.1, iTunes for Windows up to version 12.9.5, and iCloud for Windows up to version 7.12.
An attacker can exploit CVE-2019-8577 by leveraging an input validation issue to gain elevated privileges in an application.
CVE-2019-8577 is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, iTunes for Windows 12.9.5, and iCloud for Windows 7.12. It is recommended to update to the latest versions of the affected software.