First published: Mon Jul 22 2019(Updated: )
Quick Look. This issue was addressed with improved checks.
Credit: natashenka Samuel Groß Google Project Zeronatashenka Samuel Groß Google Project Zeronatashenka Samuel Groß Google Project ZeroNatalie Silvanovich Samuel Groß Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <12.4 | |
Apple Mac OS X | <10.14.6 | |
Apple tvOS | <12.4 | |
Apple watchOS | <5.3 | |
Apple tvOS | <12.4 | 12.4 |
Apple macOS Mojave | <10.14.6 | 10.14.6 |
Apple High Sierra | ||
Apple Sierra | ||
Apple watchOS | <5.3 | 5.3 |
Apple iOS | <12.4 | 12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-8662 is a vulnerability that allows an attacker to trigger a use-after-free in an application deserializing an untrusted NSDictionary.
CVE-2019-8662 was addressed with improved checks in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, and watchOS 5.3.
CVE-2019-8662 has a severity rating of 9.8 out of 10 (Critical).
iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, and watchOS 5.3 are affected by CVE-2019-8662.
To fix CVE-2019-8662, update your device to iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, or watchOS 5.3.