First published: Mon Jul 22 2019(Updated: )
WebKit. Multiple memory corruption issues were addressed with improved memory handling.
Credit: G. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLaban anonymous researcher Anthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project Zeroakayn Trend MicroSamuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia Techlokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLInsu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <12.9.6 | 12.9.6 |
Apple iCloud for Windows | <7.13 | 7.13 |
Apple iCloud for Windows | <10.6 | 10.6 |
Apple watchOS | <5.3 | 5.3 |
Apple macOS Mojave | <10.14.6 | 10.14.6 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.4 | 12.4 |
Apple iOS | <12.4 | 12.4 |
redhat/webkitgtk | <2.24.2 | 2.24.2 |
Apple Icloud Windows | <7.13 | |
Apple Icloud Windows | >=10.0<10.6 | |
Apple Itunes Windows | <12.9.6 | |
Apple Safari | <12.1.2 | |
Apple iPhone OS | <12.4 | |
Apple Mac OS X | <10.14.6 | |
Apple tvOS | <12.4 | |
Apple watchOS | <5.3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2019-8672.
The following software versions are affected: iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6, Safari 12.1.2, iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3.
The severity of CVE-2019-8672 is critical with a CVSS score of 8.8.
To fix this vulnerability, you should update to the fixed versions of the affected software: iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6.
You can find more information about this vulnerability on Apple's support page: [https://support.apple.com/en-us/HT210348](https://support.apple.com/en-us/HT210348).