ID

VAR-201912-0457


CVE

CVE-2019-7292


TITLE

Input validation vulnerability in multiple Apple products

Trust: 0.8

sources: JVNDB: JVNDB-2019-016879

DESCRIPTION

A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may result in the disclosure of process memory. iCloud , iTunes , Safari Multiple Apple products contain vulnerabilities related to input validation.Information may be obtained. Apple Safari could allow a remote malicious user to obtain sensitive information, caused by a validation issue in the WebKit component. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to obtain sensitive information. CVE-2019-8546: ChiYuan Chang Passcode Available for: Apple Watch Series 1 and later Impact: A partially entered passcode may not clear when the device goes to sleep Description: An issue existed where partially entered passcodes may not clear when the device went to sleep. This issue was addressed by clearing the passcode when a locked device sleeps. Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2019-3-25-1 iOS 12.2 iOS 12.2 is now available and addresses the following: CFString Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted string may lead to a denial of service Description: A validation issue was addressed with improved logic. CVE-2019-8516: SWIPS Team of Frifee Inc. configd Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to elevate privileges Description: A memory initialization issue was addressed with improved memory handling. CVE-2019-8552: Mohamed Ghannam (@_simo36) Contacts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to elevate privileges Description: A buffer overflow issue was addressed with improved memory handling. CVE-2019-8511: an anonymous researcher CoreCrypto Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to elevate privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-2019-8542: an anonymous researcher Exchange ActiveSync Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A user may authorize an enterprise administrator to remotely wipe their device without appropriate disclosure Description: This issue was addressed with improved transparency. CVE-2019-8512: an anonymous researcher, an anonymous researcher FaceTime Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A user's video may not be paused in a FaceTime call if they exit the FaceTime app while the call is ringing Description: An issue existed in the pausing of FaceTime video. CVE-2019-8550: Lauren Guzniczak of Keystone Academy Feedback Assistant Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to gain root privileges Description: A race condition was addressed with additional validation. CVE-2019-8565: CodeColorist of Ant-Financial LightYear Labs Feedback Assistant Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to overwrite arbitrary files Description: This issue was addressed with improved checks. CVE-2019-8521: CodeColorist of Ant-Financial LightYear Labs file Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted file might disclose user information Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-6237: an anonymous researcher GeoServices Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Clicking a malicious SMS link may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved validation. CVE-2019-8553: an anonymous researcher iAP Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to elevate privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-2019-8542: an anonymous researcher IOHIDFamily Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to cause unexpected system termination or read kernel memory Description: A memory corruption issue was addressed with improved state management. CVE-2019-8545: Adam Donenfeld (@doadam) of the Zimperium zLabs Team IOKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to read kernel memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2019-8504: an anonymous researcher IOKit SCSI Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8529: Juwei Lin (@panicaII) of Trend Micro Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory Description: A buffer overflow was addressed with improved size validation. CVE-2019-8527: Ned Williamson of Google and derrek (@derrekr6) Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to gain elevated privileges Description: A logic issue was addressed with improved state management. CVE-2019-8514: Samuel Groß of Google Project Zero Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to determine kernel memory layout Description: A memory initialization issue was addressed with improved memory handling. CVE-2019-8540: Weibo Wang (@ma1fan) of Qihoo 360 Nirvan Team Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to read kernel memory Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-7293: Ned Williamson of Google Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. CVE-2019-6207: Weibo Wang of Qihoo 360 Nirvan Team (@ma1fan) CVE-2019-8510: Stefan Esser of Antid0te UG Mail Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted mail message may lead to S/MIME signature spoofing Description: This issue was addressed with improved checks. CVE-2019-7284: Damian Poddebniak of Münster University of Applied Sciences Messages Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to view sensitive user information Description: An access issue was addressed with additional sandbox restrictions. CVE-2019-8546: ChiYuan Chang Power Management Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple input validation issues existed in MIG generated code. CVE-2019-8549: Mohamed Ghannam (@_simo36) of SSD Secure Disclosure (ssd-disclosure.com) Privacy Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious app may be able to track users between installs Description: A privacy issue existed in motion sensor calibration. CVE-2019-8541: Stan (Jiexin) Zhang and Alastair R. Beresford of the University of Cambridge, Ian Sheret of Polymath Insight Limited ReplayKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to access the microphone without indication to the user Description: An API issue existed in the handling of microphone data. CVE-2019-8566: an anonymous researcher Safari Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A website may be able to access sensor information without user consent Description: A permissions issue existed in the handling of motion and orientation data. CVE-2019-8554: an anonymous researcher Safari Reader Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Enabling the Safari Reader feature on a maliciously crafted webpage may lead to universal cross site scripting Description: A logic issue was addressed with improved validation. CVE-2019-6204: Ryan Pickren (ryanpickren.com) CVE-2019-8505: Ryan Pickren (ryanpickren.com) Siri Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to initiate a Dictation request without user authorization Description: An API issue existed in the handling of dictation requests. CVE-2019-8502: Luke Deshotels of North Carolina State University, Jordan Beichler of North Carolina State University, William Enck of North Carolina State University, Costin Carabaș of University POLITEHNICA of Bucharest, and Răzvan Deaconescu of University POLITEHNICA of Bucharest TrueTypeScaler Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-8517: riusksk of VulWar Corp working with Trend Micro Zero Day Initiative WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved validation. CVE-2019-8551: Ryan Pickren (ryanpickren.com) WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2019-8535: Zhiyang Zeng (@Wester) of Tencent Blade Team WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2019-6201: dwfault working with ADLab of Venustech CVE-2019-8518: Samuel Groß of Google Project Zero CVE-2019-8523: Apple CVE-2019-8524: G. Geshev working with Trend Micro Zero Day Initiative CVE-2019-8558: Samuel Groß of Google Project Zero CVE-2019-8559: Apple CVE-2019-8563: Apple WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A memory corruption issue was addressed with improved validation. CVE-2019-8562: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of Chaitin Security Research Lab WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A website may be able to access the microphone without the microphone use indicator being shown Description: A consistency issue was addressed with improved state handling. CVE-2019-6222: Denis Markov of Resonance Software WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8536: Apple CVE-2019-8544: an anonymous researcher WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may disclose sensitive user information Description: A cross-origin issue existed with the fetch API. CVE-2019-8515: James Lee (@Windowsrcer) WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2019-7285: dwfault working at ADLab of Venustech CVE-2019-8556: Apple WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed with improved memory handling. CVE-2019-8506: Samuel Groß of Google Project Zero WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious website may be able to execute scripts in the context of another website Description: A logic issue was addressed with improved validation. CVE-2019-7292: Zhunki and Zhiyi Zhang of 360 ESG Codesafe Team Wi-Fi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A device may be passively tracked by its WiFi MAC address Description: A user privacy issue was addressed by removing the broadcast MAC address. CVE-2019-8567: David Kreitschmann and Milan Stute of Secure Mobile Networking Lab at Technische Universität Darmstadt XPC Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to overwrite arbitrary files Description: This issue was addressed with improved checks. CVE-2019-8530: CodeColorist of Ant-Financial LightYear Labs Additional recognition Books We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance. Calendar We would like to acknowledge Peter Hempsall of 104days.com, Sascha Mogler of mogler.com, and an anonymous researcher for their assistance. Kernel We would like to acknowledge Brandon Azad of Google Project Zero for their assistance. Quick Look We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance. Safari We would like to acknowledge Nikhil Mittal (@c0d3G33k) of Payatu Labs (payatu.com) for their assistance. Screen Time We would like to acknowledge Brandon Moore (@Brandonsecurity) for their assistance. WebKit We would like to acknowledge Andrey Kovalev of Yandex Security Team for their assistance. Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 12.2". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlyZM7opHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3GIIBAA kEosQIr8/w6Qjtw2KzO753EFWM0kp4Ylv1Z0hlrAAX3YROpt18Xq+RWTgJ+3yhXu 136ZfBYEOJx+Jxv7nokB+ZvP1832WqccV1XU4XVxxsGvEshyFeXrIWxHz9a6aTi9 ozTTzJ5N9pZnd+ImJp51TQ8Q38KoqUPMU2stTr/SYE43S/9bz28fFTXHBS6WQBMz fgevfhMV0Ty3QnuIpLeeCZ1SwC51a0yZ/BV88E+G8xgplgh2R8Mc2bZosP8JIjMx 7KdtpBh30+BvB++MzteQG0gE+aIs6p4CLPgzkm67UZApbKIlYJxkZXv/pIy+DdS1 LGwBwZ5TRJ73uAGZO7jtpx6FNN3sSthI84y5x7df+hretVSFTqsEAErcI4Ns8HiD m3Jd3OJxMBEGC7SVz+r8IfkwnyQxurQMDj063ojsT6HBUOTZcYn6VX/h37MCwnO4 +GVFivjZklbp/lt7WiGs2j4mDs7jgt5SsNm0K3Nm/2EOT3I2HNc/8msJBbH/uF9h dVYsC8+7uEDqHIQ30FO2NCUzJrtjWHA1rxLS0XnY1uvv/09LjPMc/Y1VuIuvKSuZ Xv7+V5tCjaZRMow6IwH0qON30O0puRr6YnJchRO7TILCoW5bibzX5oxeJm2E6lsK SjGjz4yWGw+2VFkNkFbbA8OKSZYk4ck2WdWgf6s0Vgc= =VAWG -----END PGP SIGNATURE-----= . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201909-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: WebkitGTK+: Multiple vulnerabilities Date: September 06, 2019 Bugs: #683234, #686216, #693122 ID: 201909-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code. Background ========== WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-libs/webkit-gtk < 2.24.4 >= 2.24.4 Description =========== Multiple vulnerabilities have been discovered in WebkitGTK+. Please review the CVE identifiers referenced below for details. Workaround ========== There is no known workaround at this time. Resolution ========== All WebkitGTK+ users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.24.4" References ========== [ 1 ] CVE-2019-11070 https://nvd.nist.gov/vuln/detail/CVE-2019-11070 [ 2 ] CVE-2019-6201 https://nvd.nist.gov/vuln/detail/CVE-2019-6201 [ 3 ] CVE-2019-6251 https://nvd.nist.gov/vuln/detail/CVE-2019-6251 [ 4 ] CVE-2019-7285 https://nvd.nist.gov/vuln/detail/CVE-2019-7285 [ 5 ] CVE-2019-7292 https://nvd.nist.gov/vuln/detail/CVE-2019-7292 [ 6 ] CVE-2019-8503 https://nvd.nist.gov/vuln/detail/CVE-2019-8503 [ 7 ] CVE-2019-8506 https://nvd.nist.gov/vuln/detail/CVE-2019-8506 [ 8 ] CVE-2019-8515 https://nvd.nist.gov/vuln/detail/CVE-2019-8515 [ 9 ] CVE-2019-8518 https://nvd.nist.gov/vuln/detail/CVE-2019-8518 [ 10 ] CVE-2019-8523 https://nvd.nist.gov/vuln/detail/CVE-2019-8523 [ 11 ] CVE-2019-8524 https://nvd.nist.gov/vuln/detail/CVE-2019-8524 [ 12 ] CVE-2019-8535 https://nvd.nist.gov/vuln/detail/CVE-2019-8535 [ 13 ] CVE-2019-8536 https://nvd.nist.gov/vuln/detail/CVE-2019-8536 [ 14 ] CVE-2019-8544 https://nvd.nist.gov/vuln/detail/CVE-2019-8544 [ 15 ] CVE-2019-8551 https://nvd.nist.gov/vuln/detail/CVE-2019-8551 [ 16 ] CVE-2019-8558 https://nvd.nist.gov/vuln/detail/CVE-2019-8558 [ 17 ] CVE-2019-8559 https://nvd.nist.gov/vuln/detail/CVE-2019-8559 [ 18 ] CVE-2019-8563 https://nvd.nist.gov/vuln/detail/CVE-2019-8563 [ 19 ] CVE-2019-8595 https://nvd.nist.gov/vuln/detail/CVE-2019-8595 [ 20 ] CVE-2019-8607 https://nvd.nist.gov/vuln/detail/CVE-2019-8607 [ 21 ] CVE-2019-8615 https://nvd.nist.gov/vuln/detail/CVE-2019-8615 [ 22 ] CVE-2019-8644 https://nvd.nist.gov/vuln/detail/CVE-2019-8644 [ 23 ] CVE-2019-8644 https://nvd.nist.gov/vuln/detail/CVE-2019-8644 [ 24 ] CVE-2019-8649 https://nvd.nist.gov/vuln/detail/CVE-2019-8649 [ 25 ] CVE-2019-8649 https://nvd.nist.gov/vuln/detail/CVE-2019-8649 [ 26 ] CVE-2019-8658 https://nvd.nist.gov/vuln/detail/CVE-2019-8658 [ 27 ] CVE-2019-8658 https://nvd.nist.gov/vuln/detail/CVE-2019-8658 [ 28 ] CVE-2019-8666 https://nvd.nist.gov/vuln/detail/CVE-2019-8666 [ 29 ] CVE-2019-8666 https://nvd.nist.gov/vuln/detail/CVE-2019-8666 [ 30 ] CVE-2019-8669 https://nvd.nist.gov/vuln/detail/CVE-2019-8669 [ 31 ] CVE-2019-8669 https://nvd.nist.gov/vuln/detail/CVE-2019-8669 [ 32 ] CVE-2019-8671 https://nvd.nist.gov/vuln/detail/CVE-2019-8671 [ 33 ] CVE-2019-8671 https://nvd.nist.gov/vuln/detail/CVE-2019-8671 [ 34 ] CVE-2019-8672 https://nvd.nist.gov/vuln/detail/CVE-2019-8672 [ 35 ] CVE-2019-8672 https://nvd.nist.gov/vuln/detail/CVE-2019-8672 [ 36 ] CVE-2019-8673 https://nvd.nist.gov/vuln/detail/CVE-2019-8673 [ 37 ] CVE-2019-8673 https://nvd.nist.gov/vuln/detail/CVE-2019-8673 [ 38 ] CVE-2019-8676 https://nvd.nist.gov/vuln/detail/CVE-2019-8676 [ 39 ] CVE-2019-8676 https://nvd.nist.gov/vuln/detail/CVE-2019-8676 [ 40 ] CVE-2019-8677 https://nvd.nist.gov/vuln/detail/CVE-2019-8677 [ 41 ] CVE-2019-8677 https://nvd.nist.gov/vuln/detail/CVE-2019-8677 [ 42 ] CVE-2019-8678 https://nvd.nist.gov/vuln/detail/CVE-2019-8678 [ 43 ] CVE-2019-8678 https://nvd.nist.gov/vuln/detail/CVE-2019-8678 [ 44 ] CVE-2019-8679 https://nvd.nist.gov/vuln/detail/CVE-2019-8679 [ 45 ] CVE-2019-8679 https://nvd.nist.gov/vuln/detail/CVE-2019-8679 [ 46 ] CVE-2019-8680 https://nvd.nist.gov/vuln/detail/CVE-2019-8680 [ 47 ] CVE-2019-8680 https://nvd.nist.gov/vuln/detail/CVE-2019-8680 [ 48 ] CVE-2019-8681 https://nvd.nist.gov/vuln/detail/CVE-2019-8681 [ 49 ] CVE-2019-8681 https://nvd.nist.gov/vuln/detail/CVE-2019-8681 [ 50 ] CVE-2019-8683 https://nvd.nist.gov/vuln/detail/CVE-2019-8683 [ 51 ] CVE-2019-8683 https://nvd.nist.gov/vuln/detail/CVE-2019-8683 [ 52 ] CVE-2019-8684 https://nvd.nist.gov/vuln/detail/CVE-2019-8684 [ 53 ] CVE-2019-8684 https://nvd.nist.gov/vuln/detail/CVE-2019-8684 [ 54 ] CVE-2019-8686 https://nvd.nist.gov/vuln/detail/CVE-2019-8686 [ 55 ] CVE-2019-8686 https://nvd.nist.gov/vuln/detail/CVE-2019-8686 [ 56 ] CVE-2019-8687 https://nvd.nist.gov/vuln/detail/CVE-2019-8687 [ 57 ] CVE-2019-8687 https://nvd.nist.gov/vuln/detail/CVE-2019-8687 [ 58 ] CVE-2019-8688 https://nvd.nist.gov/vuln/detail/CVE-2019-8688 [ 59 ] CVE-2019-8688 https://nvd.nist.gov/vuln/detail/CVE-2019-8688 [ 60 ] CVE-2019-8689 https://nvd.nist.gov/vuln/detail/CVE-2019-8689 [ 61 ] CVE-2019-8689 https://nvd.nist.gov/vuln/detail/CVE-2019-8689 [ 62 ] CVE-2019-8690 https://nvd.nist.gov/vuln/detail/CVE-2019-8690 [ 63 ] CVE-2019-8690 https://nvd.nist.gov/vuln/detail/CVE-2019-8690 [ 64 ] WSA-2019-0002 https://webkitgtk.org/security/WSA-2019-0002.html [ 65 ] WSA-2019-0004 https://webkitgtk.org/security/WSA-2019-0004.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/201909-05 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2019 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . Installation note: Safari 12.1 may be obtained from the Mac App Store

Trust: 2.43

sources: NVD: CVE-2019-7292 // JVNDB: JVNDB-2019-016879 // VULHUB: VHN-158727 // VULMON: CVE-2019-7292 // PACKETSTORM: 152277 // PACKETSTORM: 152227 // PACKETSTORM: 154389 // PACKETSTORM: 152228 // PACKETSTORM: 152224 // PACKETSTORM: 152226 // PACKETSTORM: 152225

AFFECTED PRODUCTS

vendor:applemodel:icloudscope:ltversion:7.11

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:5.2

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:12.2

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:12.2

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:12.9.4

Trust: 1.0

vendor:applemodel:safariscope:ltversion:12.1

Trust: 1.0

vendor:アップルmodel:itunesscope: - version: -

Trust: 0.8

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

vendor:アップルmodel:watchosscope:eqversion:5.2

Trust: 0.8

vendor:アップルmodel:safariscope: - version: -

Trust: 0.8

vendor:アップルmodel:tvosscope: - version: -

Trust: 0.8

vendor:アップルmodel:icloudscope: - version: -

Trust: 0.8

vendor:applemodel:icloudscope:eqversion:6.1.1

Trust: 0.1

vendor:applemodel:icloudscope:eqversion:7.7

Trust: 0.1

vendor:applemodel:icloudscope:eqversion:7.8.1

Trust: 0.1

vendor:applemodel:icloudscope:eqversion:7.10

Trust: 0.1

vendor:applemodel:itunesscope:eqversion:12.1.3

Trust: 0.1

vendor:applemodel:itunesscope:eqversion:12.5.5

Trust: 0.1

vendor:applemodel:itunesscope:eqversion:12.9

Trust: 0.1

vendor:applemodel:safariscope:eqversion: -

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.0b1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.0b2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.0b1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.1.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.2.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.3.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.0b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.1b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.2b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.3b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.0.4b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.0b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.1b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.1.2b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.0b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.1b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:3.2.2b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.1.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.2.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.2.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.2.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.2.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:6.2.8

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:7.1.8

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0.4

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0.5

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0.6

Trust: 0.1

vendor:applemodel:safariscope:eqversion:8.0.8

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:9.1.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:10.0.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:10.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:10.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:10.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:10.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.0.3

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.1.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:11.1.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:12

Trust: 0.1

vendor:applemodel:safariscope:eqversion:12.0

Trust: 0.1

vendor:applemodel:safariscope:eqversion:12.0.1

Trust: 0.1

vendor:applemodel:safariscope:eqversion:12.0.2

Trust: 0.1

vendor:applemodel:safariscope:eqversion:12.0.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:3.2.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.6

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.7

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.8

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.9

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.2.10

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:4.3.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:5.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:5.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:5.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:6.1.6

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.0.6

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:7.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.1.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:8.4.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:9.3.6

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.0.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.3.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.3.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:10.3.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.0.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.0.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2.5

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.2.6

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.3.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.4

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:11.4.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:12.0

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:12.0.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:12.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:12.1.1

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:12.1.2

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:12.1.3

Trust: 0.1

vendor:applemodel:iphone osscope:eqversion:12.1.4

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:1.0.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:1.1.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.0.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.0.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.1.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.2.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.3.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.3.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:2.4.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:3.0.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:3.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:3.0.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.1.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.2.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.2.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.3.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.4.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.4.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.4.3

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:4.4.4

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.0.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.0.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.1.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:5.2.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.0.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.1.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:6.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:7.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:7.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:7.0.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:7.0.3

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:7.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:9.2.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.1.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:10.2.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.0

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.2

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.2.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.2.6

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.3

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:11.4.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:12

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:12.0.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:12.1

Trust: 0.1

vendor:applemodel:tvosscope:eqversion:12.1.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:1.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:1.0.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.0.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.2.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.2.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:2.2.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.1.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.1.3

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.2.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:3.2.3

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.0.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.2.3

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.3

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.3.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:4.3.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:5.0

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:5.0.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:5.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:5.1.1

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:5.1.2

Trust: 0.1

vendor:applemodel:watchosscope:eqversion:5.1.3

Trust: 0.1

sources: VULMON: CVE-2019-7292 // JVNDB: JVNDB-2019-016879 // NVD: CVE-2019-7292

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-7292
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-7292
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201903-1014
value: MEDIUM

Trust: 0.6

VULHUB: VHN-158727
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-7292
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-7292
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-158727
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-7292
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-7292
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-158727 // VULMON: CVE-2019-7292 // JVNDB: JVNDB-2019-016879 // CNNVD: CNNVD-201903-1014 // NVD: CVE-2019-7292

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:Inappropriate input confirmation (CWE-20) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-158727 // JVNDB: JVNDB-2019-016879 // NVD: CVE-2019-7292

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201903-1014

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201903-1014

PATCH

title:HT209604 Apple  Security updateurl:https://support.apple.com/en-us/HT209599

Trust: 0.8

title:Multiple Apple product WebKit Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=90457

Trust: 0.6

title:Apple: iTunes 12.9.4 for Windowsurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=0e74c4754b41f986f23a36b9acc63c5c

Trust: 0.1

title:Apple: Safari 12.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=686247978a3dcc9a7a5321d1cd532d44

Trust: 0.1

title:Apple: iCloud for Windows 7.11url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=318b615f18d0a41dc42000c54bce66cc

Trust: 0.1

title:Apple: watchOS 5.2url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=2535ab738191c2105f7d40d8c90ed298

Trust: 0.1

title:Superionurl:https://github.com/zhunki/Superion

Trust: 0.1

title:DRL-Guided-Fuzzingurl:https://github.com/tangsongTJU/DRL-Guided-Fuzzing

Trust: 0.1

sources: VULMON: CVE-2019-7292 // JVNDB: JVNDB-2019-016879 // CNNVD: CNNVD-201903-1014

EXTERNAL IDS

db:NVDid:CVE-2019-7292

Trust: 4.1

db:JVNDBid:JVNDB-2019-016879

Trust: 0.8

db:PACKETSTORMid:152277

Trust: 0.7

db:PACKETSTORMid:152228

Trust: 0.7

db:PACKETSTORMid:152485

Trust: 0.6

db:AUSCERTid:ESB-2019.0991

Trust: 0.6

db:AUSCERTid:ESB-2019.1032

Trust: 0.6

db:CNNVDid:CNNVD-201903-1014

Trust: 0.6

db:VULHUBid:VHN-158727

Trust: 0.1

db:VULMONid:CVE-2019-7292

Trust: 0.1

db:PACKETSTORMid:152227

Trust: 0.1

db:PACKETSTORMid:154389

Trust: 0.1

db:PACKETSTORMid:152224

Trust: 0.1

db:PACKETSTORMid:152226

Trust: 0.1

db:PACKETSTORMid:152225

Trust: 0.1

sources: VULHUB: VHN-158727 // VULMON: CVE-2019-7292 // JVNDB: JVNDB-2019-016879 // PACKETSTORM: 152277 // PACKETSTORM: 152227 // PACKETSTORM: 154389 // PACKETSTORM: 152228 // PACKETSTORM: 152224 // PACKETSTORM: 152226 // PACKETSTORM: 152225 // CNNVD: CNNVD-201903-1014 // NVD: CVE-2019-7292

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-7292

Trust: 2.1

url:https://support.apple.com/ht209599

Trust: 1.8

url:https://support.apple.com/ht209601

Trust: 1.8

url:https://support.apple.com/ht209602

Trust: 1.8

url:https://support.apple.com/ht209603

Trust: 1.8

url:https://support.apple.com/ht209604

Trust: 1.8

url:https://support.apple.com/ht209605

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8518

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-8506

Trust: 0.7

url:https://support.apple.com/kb/ht201222

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-8544

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-8536

Trust: 0.6

url:https://www.apple.com/support/security/pgp/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-8524

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-6201

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-7285

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-8523

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-8503

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-8515

Trust: 0.6

url:https://support.apple.com/en-au/ht209599

Trust: 0.6

url:https://support.apple.com/en-au/ht209602

Trust: 0.6

url:https://support.apple.com/en-us/ht209603

Trust: 0.6

url:https://support.apple.com/en-us/ht209602

Trust: 0.6

url:https://packetstormsecurity.com/files/152228/apple-security-advisory-2019-3-25-6.html

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-ios-multiple-vulnerabilities-28854

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77810

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77986

Trust: 0.6

url:https://packetstormsecurity.com/files/152277/apple-security-advisory-2019-3-27-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/152485/webkitgtk-wpe-webkit-uri-spoofing-code-execution.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-8558

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-8559

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-8563

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-8535

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-8551

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-8542

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8514

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8502

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8516

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-6237

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8527

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8517

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-6207

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-7293

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8510

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8556

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8511

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8540

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8545

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-7286

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8549

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8505

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-6204

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8530

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8562

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/158595

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8546

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8553

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8552

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8541

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8548

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-7284

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8512

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8521

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8504

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-6222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8529

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8615

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8669

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8687

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8644

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8680

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8688

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8607

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8690

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8686

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8671

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8649

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8672

Trust: 0.1

url:https://webkitgtk.org/security/wsa-2019-0002.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8658

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11070

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8684

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8666

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8683

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8678

Trust: 0.1

url:https://webkitgtk.org/security/wsa-2019-0004.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-6251

Trust: 0.1

url:https://security.gentoo.org/glsa/201909-05

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8677

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8689

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8676

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8679

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8681

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8673

Trust: 0.1

url:https://support.apple.com/ht204283

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-6232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-6236

Trust: 0.1

url:https://www.apple.com/itunes/download/

Trust: 0.1

sources: VULHUB: VHN-158727 // VULMON: CVE-2019-7292 // JVNDB: JVNDB-2019-016879 // PACKETSTORM: 152277 // PACKETSTORM: 152227 // PACKETSTORM: 154389 // PACKETSTORM: 152228 // PACKETSTORM: 152224 // PACKETSTORM: 152226 // PACKETSTORM: 152225 // CNNVD: CNNVD-201903-1014 // NVD: CVE-2019-7292

CREDITS

Apple

Trust: 0.6

sources: PACKETSTORM: 152277 // PACKETSTORM: 152227 // PACKETSTORM: 152228 // PACKETSTORM: 152224 // PACKETSTORM: 152226 // PACKETSTORM: 152225

SOURCES

db:VULHUBid:VHN-158727
db:VULMONid:CVE-2019-7292
db:JVNDBid:JVNDB-2019-016879
db:PACKETSTORMid:152277
db:PACKETSTORMid:152227
db:PACKETSTORMid:154389
db:PACKETSTORMid:152228
db:PACKETSTORMid:152224
db:PACKETSTORMid:152226
db:PACKETSTORMid:152225
db:CNNVDid:CNNVD-201903-1014
db:NVDid:CVE-2019-7292

LAST UPDATE DATE

2024-11-21T21:38:25.998000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-158727date:2019-12-31T00:00:00
db:VULMONid:CVE-2019-7292date:2019-12-31T00:00:00
db:JVNDBid:JVNDB-2019-016879date:2024-07-19T04:43:00
db:CNNVDid:CNNVD-201903-1014date:2021-11-03T00:00:00
db:NVDid:CVE-2019-7292date:2019-12-31T18:14:20.687

SOURCES RELEASE DATE

db:VULHUBid:VHN-158727date:2019-12-18T00:00:00
db:VULMONid:CVE-2019-7292date:2019-12-18T00:00:00
db:JVNDBid:JVNDB-2019-016879date:2024-07-19T00:00:00
db:PACKETSTORMid:152277date:2019-03-28T16:23:02
db:PACKETSTORMid:152227date:2019-03-26T14:43:20
db:PACKETSTORMid:154389date:2019-09-06T22:21:59
db:PACKETSTORMid:152228date:2019-03-26T14:43:31
db:PACKETSTORMid:152224date:2019-03-26T14:42:21
db:PACKETSTORMid:152226date:2019-03-26T14:43:04
db:PACKETSTORMid:152225date:2019-03-26T14:42:33
db:CNNVDid:CNNVD-201903-1014date:2019-03-26T00:00:00
db:NVDid:CVE-2019-7292date:2019-12-18T18:15:22.363