First published: Mon Jul 22 2019(Updated: )
WebKit. Multiple memory corruption issues were addressed with improved memory handling.
Credit: G. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLaban anonymous researcher Anthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project Zeroakayn Trend MicroSamuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia Techlokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLInsu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <12.9.6 | 12.9.6 |
Apple iCloud for Windows | <7.13 | 7.13 |
Apple iCloud for Windows | <10.6 | 10.6 |
Apple watchOS | <5.3 | 5.3 |
Apple macOS Mojave | <10.14.6 | 10.14.6 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.4 | 12.4 |
Apple iOS | <12.4 | 12.4 |
redhat/webkitgtk | <2.24.3 | 2.24.3 |
Apple Icloud Windows | <7.13 | |
Apple Icloud Windows | >=10.0<10.6 | |
Apple Itunes Windows | <12.9.6 | |
Apple Safari | <12.1.2 | |
Apple iPhone OS | <12.4 | |
Apple Mac OS X | <10.14.6 | |
Apple tvOS | <12.4 | |
Apple watchOS | <5.3 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2019-8676 is a vulnerability in WebKit that allows remote attackers to execute arbitrary code or cause a denial of service
CVE-2019-8676 has a severity score of 8.8 (critical).
Versions iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, and iCloud for Windows 10.6 are affected by CVE-2019-8676.
To fix CVE-2019-8676, update your software to iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, watchOS 5.3, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, or iCloud for Windows 10.6, depending on the affected software.
You can find more information about CVE-2019-8676 on the Apple support page: [https://support.apple.com/en-us/HT210348](https://support.apple.com/en-us/HT210348)