First published: Mon Jul 22 2019(Updated: )
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, iCloud for Windows 10.6. Processing maliciously crafted web content may lead to arbitrary code execution.
Credit: G. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLaban anonymous researcher Anthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project ZeroG. Geshev Trend MicroZongming Wang (王宗明) Zhe Jin (金哲) Chengdu Security Response Center of Qihoo 360 Technology Coakayn Trend MicroApple Samuel Groß Google Project ZeroSoyeon Park Wen Xu SSLab at Georgia TechSoyeon Park Wen Xu SSLab at Georgia TechJihui Lu Tencent KeenLabAnthony Lai @darkfloyd1014 KnownsecKen Wong @wwkenwong VXRLJeonghoon Shin @singi21a TheoriJohnny Yu @straight_blast VX Browser Exploitation GroupChris Chan @dr4g0nfl4me VX Browser Exploitation GroupPhil Mok @shadyhamsters VX Browser Exploitation GroupAlan Ho @alan_h0 KnownsecByron Wai VX Browser ExploitationP1umer ADLab of VenustechJihui Lu Tencent KeenLabJihui Lu Tencent KeenLabG. Geshev Trend Micro Zero Day Initiativelokihardt Google Project Zerolokihardt Google Project Zeroakayn Dongzhuo Zhao ADLab of VenustechKen Wong @wwkenwong VXRLAnthony Lai @darkfloyd1014 VXRL Eric Lung @Khlung1 VXRLG. Geshev Trend MicroApple Insu Yun SSLab at Georgia Techlokihardt Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <12.9.6 | 12.9.6 |
Apple iCloud for Windows | <7.13 | 7.13 |
Apple iCloud for Windows | <10.6 | 10.6 |
Apple macOS Mojave | <10.14.6 | 10.14.6 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.4 | 12.4 |
Apple iOS | <12.4 | 12.4 |
redhat/webkitgtk | <2.24.2 | 2.24.2 |
Apple Icloud Windows | <7.13 | |
Apple Icloud Windows | >=10.0<10.6 | |
Apple Itunes Windows | <12.9.6 | |
Apple Safari | <12.1.2 | |
Apple iPhone OS | <12.4 | |
Apple Mac OS X | <10.14.6 | |
Apple tvOS | <12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2019-8677 is a vulnerability in WebKit that could allow processing maliciously crafted web content to lead to arbitrary code execution.
CVE-2019-8677 has a severity rating of 8.8 (high).
iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, and iCloud for Windows 10.6 are affected by CVE-2019-8677.
To fix CVE-2019-8677, update to iOS 12.4, macOS Mojave 10.14.6, tvOS 12.4, Safari 12.1.2, iTunes for Windows 12.9.6, iCloud for Windows 7.13, or iCloud for Windows 10.6.
You can find more information about CVE-2019-8677 on the Apple support page: [link](https://support.apple.com/en-us/HT210348).