ID

VAR-201912-0540


CVE

CVE-2019-8519


TITLE

plural Apple Updates to product vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2019-001923

DESCRIPTION

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Mojave 10.14.4. An application may be able to read restricted memory. Apple Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * Insufficient access restrictions * Cross-site scripting * Privilege escalation * Service operation interruption (DoS) * Sandbox avoidance * Information falsification * information leak * Arbitrary code execution * Arbitrary command execution * Memory corruption. This vulnerability allows local attackers to disclose sensitive information on vulnerable installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the AMDRadeonX4000 kernel extension. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges in the context of the kernel. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2019-3-25-2 macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra are now available and addresses the following: AppleGraphicsControl Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A buffer overflow was addressed with improved size validation. CVE-2019-8555: Zhiyi Zhang of 360 ESG Codesafe Team, Zhuo Liang and shrek_wzw of Qihoo 360 Nirvan Team Bom Available for: macOS Mojave 10.14.3 Impact: A malicious application may bypass Gatekeeper checks Description: This issue was addressed with improved handling of file metadata. CVE-2019-6239: Ian Moorhouse and Michael Trimm CFString Available for: macOS Mojave 10.14.3 Impact: Processing a maliciously crafted string may lead to a denial of service Description: A validation issue was addressed with improved logic. CVE-2019-8516: SWIPS Team of Frifee Inc. configd Available for: macOS Mojave 10.14.3 Impact: A malicious application may be able to elevate privileges Description: A memory initialization issue was addressed with improved memory handling. CVE-2019-8552: Mohamed Ghannam (@_simo36) Contacts Available for: macOS Mojave 10.14.3 Impact: A malicious application may be able to elevate privileges Description: A buffer overflow issue was addressed with improved memory handling. CVE-2019-8511: an anonymous researcher CoreCrypto Available for: macOS Mojave 10.14.3 Impact: A malicious application may be able to elevate privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-2019-8542: an anonymous researcher DiskArbitration Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: An encrypted volume may be unmounted and remounted by a different user without prompting for the password Description: A logic issue was addressed with improved state management. CVE-2019-8522: Colin Meginnis (@falc420) FaceTime Available for: macOS Mojave 10.14.3 Impact: A user's video may not be paused in a FaceTime call if they exit the FaceTime app while the call is ringing Description: An issue existed in the pausing of FaceTime video. The issue was resolved with improved logic. CVE-2019-8550: Lauren Guzniczak of Keystone Academy Feedback Assistant Available for: macOS Mojave 10.14.3 Impact: A malicious application may be able to gain root privileges Description: A race condition was addressed with additional validation. CVE-2019-8565: CodeColorist of Ant-Financial LightYear Labs Feedback Assistant Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: A malicious application may be able to overwrite arbitrary files Description: This issue was addressed with improved checks. CVE-2019-8521: CodeColorist of Ant-Financial LightYear Labs file Available for: macOS Mojave 10.14.3 Impact: Processing a maliciously crafted file might disclose user information Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-8519: Aleksandr Tarasikov (@astarasikov), Juwei Lin (@panicaII) and Junzhi Lu of Trend Micro Research working with Trend Micro's Zero Day Initiative iAP Available for: macOS Mojave 10.14.3 Impact: A malicious application may be able to elevate privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-2019-8542: an anonymous researcher IOGraphics Available for: macOS Mojave 10.14.3 Impact: A Mac may not lock when disconnecting from an external monitor Description: A lock handling issue was addressed with improved lock handling. CVE-2019-8533: an anonymous researcher, James Eagan of Télécom ParisTech, R. Scott Kemp of MIT, Romke van Dijk of Z-CERT IOHIDFamily Available for: macOS Mojave 10.14.3 Impact: A local user may be able to cause unexpected system termination or read kernel memory Description: A memory corruption issue was addressed with improved state management. CVE-2019-8545: Adam Donenfeld (@doadam) of the Zimperium zLabs Team IOKit Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: A local user may be able to read kernel memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2019-8504: an anonymous researcher IOKit SCSI Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8529: Juwei Lin (@panicaII) of Trend Micro Kernel Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory Description: A buffer overflow was addressed with improved size validation. CVE-2019-8527: Ned Williamson of Google and derrek (@derrekr6) Kernel Available for: macOS Sierra 10.12.6, macOS Mojave 10.14.3 Impact: Mounting a maliciously crafted NFS network share may lead to arbitrary code execution with system privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-2019-8508: Dr. Silvio Cesare of InfoSect Kernel Available for: macOS Mojave 10.14.3 Impact: An application may be able to gain elevated privileges Description: A logic issue was addressed with improved state management. CVE-2019-8514: Samuel Groß of Google Project Zero Kernel Available for: macOS Sierra 10.12.6, macOS Mojave 10.14.3 Impact: A malicious application may be able to determine kernel memory layout Description: A memory initialization issue was addressed with improved memory handling. CVE-2019-8540: Weibo Wang (@ma1fan) of Qihoo 360 Nirvan Team Kernel Available for: macOS Mojave 10.14.3 Impact: A local user may be able to read kernel memory Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-7293: Ned Williamson of Google Kernel Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: A malicious application may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. CVE-2019-6207: Weibo Wang of Qihoo 360 Nirvan Team (@ma1fan) CVE-2019-8510: Stefan Esser of Antid0te UG Messages Available for: macOS Mojave 10.14.3 Impact: A local user may be able to view sensitive user information Description: An access issue was addressed with additional sandbox restrictions. CVE-2019-8546: ChiYuan Chang Notes Available for: macOS Mojave 10.14.3 Impact: A local user may be able to view a user's locked notes Description: An access issue was addressed with improved memory management. CVE-2019-8537: Greg Walker (gregwalker.us) PackageKit Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: A malicious application may be able to elevate privileges Description: A logic issue was addressed with improved validation. CVE-2019-8561: Jaron Bradley of Crowdstrike Perl Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: Multiple issues in Perl Description: Multiple issues in Perl were addressed in this update. CVE-2018-12015: Jakub Wilk CVE-2018-18311: Jayakrishna Menon CVE-2018-18313: Eiichi Tsukata Power Management Available for: macOS Mojave 10.14.3 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple input validation issues existed in MIG generated code. CVE-2019-8549: Mohamed Ghannam (@_simo36) of SSD Secure Disclosure (ssd-disclosure.com) QuartzCore Available for: macOS Mojave 10.14.3 Impact: Processing malicious data may lead to unexpected application termination Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2019-8507: Kai Lu or Fortinet's FortiGuard Labs Security Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: An application may be able to gain elevated privileges Description: A use after free issue was addressed with improved memory management. CVE-2019-8526: Linus Henze (pinauten.de) Security Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: A malicious application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-8520: Antonio Groza, The UK's National Cyber Security Centre (NCSC) Siri Available for: macOS Mojave 10.14.3 Impact: A malicious application may be able to initiate a Dictation request without user authorization Description: An API issue existed in the handling of dictation requests. CVE-2019-8502: Luke Deshotels of North Carolina State University, Jordan Beichler of North Carolina State University, William Enck of North Carolina State University, Costin Carabaș of University POLITEHNICA of Bucharest, and Răzvan Deaconescu of University POLITEHNICA of Bucharest Time Machine Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Impact: A local user may be able to execute arbitrary shell commands Description: This issue was addressed with improved checks. CVE-2019-8513: CodeColorist of Ant-Financial LightYear Labs TrueTypeScaler Available for: macOS Mojave 10.14.3 Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-8517: riusksk of VulWar Corp working with Trend Micro Zero Day Initiative XPC Available for: macOS Sierra 10.12.6, macOS Mojave 10.14.3 Impact: A malicious application may be able to overwrite arbitrary files Description: This issue was addressed with improved checks. CVE-2019-8530: CodeColorist of Ant-Financial LightYear Labs Additional recognition Accounts We would like to acknowledge Milan Stute of Secure Mobile Networking Lab at Technische Universität Darmstadt for their assistance. Books We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance. Kernel We would like to acknowledge Brandon Azad of Google Project Zero for their assistance. Mail We would like to acknowledge Craig Young of Tripwire VERT and Hanno Böck for their assistance. Time Machine We would like to acknowledge CodeColorist of Ant-Financial LightYear Labs for their assistance. Installation note: macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlyZWQgpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3E4zA/9 FvnChJHCmmH34DmCi+LGXO/fatCVVvvSHDWm1+bPjl8CeYcF+zZYACkQKxFoNpDT vyiBJnNveCQEHeBvqSyRF8dfsTf4fr0MrFS1uIQVRPf2St6fZ27vDnC6fg269r0D Eqnz0raFUa3bLUirteRMJwAqdGaVKwsNzM13qP4QEdrB14XkwZA0yQBunltFYU33 iAesKeejDLdhwkjfhmmjTlVPZmnABx2ZCfj2v7TiPxTOjfYbXcN8sY2LDHEOWNaM ucrGBMfGH/ehStXAsIArwcLGOl6SI+6JywWVcm9lG6jUHSeSk9BPF6R4JzGrEHZB sSo87+U8b63KA2GkYecwh6xvE5EchQku/fj0d2zbOlg+T2bMbyc6Al2nefsYnX5p 7BuhdZxqq3m3Gme2qRY0eye6wch1BTHhK+zctrVH2XeMaUpeanopVRI8AD+hZJ1J +9oQX8kSa7hzJYPmohA4Wi/Rp9FpKpgXYNBn1A9DgSAvf+eyfWJX0aZXmQZfn/k7 OLz3EmSKvXv0i67L9g2XYeX7GFBMqf4xWeztKLUYFafu73t1mTxZJICcYeTxebS0 zBJdkOHwP9GxsSonblDgPScQPdW85l0fangn7qqiexCVp4JsCGBc0Wuy1lc+MyzS 1YmrDRhRl4aYOf4UGgtKI6ncvM77Y30ECPV3A6vl+wk= =QV0f -----END PGP SIGNATURE-----

Trust: 3.06

sources: NVD: CVE-2019-8519 // JVNDB: JVNDB-2019-001923 // ZDI: ZDI-19-289 // ZDI: ZDI-19-569 // VULHUB: VHN-159954 // PACKETSTORM: 152222

AFFECTED PRODUCTS

vendor:applemodel:macosscope: - version: -

Trust: 1.4

vendor:applemodel:mac os xscope:ltversion:10.14.4

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:for windows 7.11 earlier

Trust: 0.8

vendor:applemodel:iosscope:ltversion:12.2 earlier

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:12.9.4 for windows earlier

Trust: 0.8

vendor:applemodel:macos high sierrascope:eqversion:(security update 2019-002 not applied )

Trust: 0.8

vendor:applemodel:macos mojavescope:ltversion:10.14.4 earlier

Trust: 0.8

vendor:applemodel:macos sierrascope:eqversion:(security update 2019-002 not applied )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:12.1 earlier

Trust: 0.8

vendor:applemodel:tvosscope:ltversion:12.2 earlier

Trust: 0.8

vendor:applemodel:watchosscope:ltversion:5.2 earlier

Trust: 0.8

vendor:applemodel:xcodescope:ltversion:10.2 earlier

Trust: 0.8

sources: ZDI: ZDI-19-289 // ZDI: ZDI-19-569 // JVNDB: JVNDB-2019-001923 // NVD: CVE-2019-8519

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-8519
value: MEDIUM

Trust: 1.0

ZDI: CVE-2019-8519
value: MEDIUM

Trust: 0.7

ZDI: CVE-2019-8519
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201903-941
value: MEDIUM

Trust: 0.6

VULHUB: VHN-159954
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2019-8519
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-159954
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-8519
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

ZDI: CVE-2019-8519
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 0.7

ZDI: CVE-2019-8519
baseSeverity: HIGH
baseScore: 7.1
vectorString: AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.2
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-19-289 // ZDI: ZDI-19-569 // VULHUB: VHN-159954 // CNNVD: CNNVD-201903-941 // NVD: CVE-2019-8519

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

sources: VULHUB: VHN-159954 // NVD: CVE-2019-8519

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201903-941

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201903-941

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001923

PATCH

title:About the security content of macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierraurl:https://support.apple.com/en-us/HT209600

Trust: 2.2

title:About the security content of iCloud for Windows 7.11url:https://support.apple.com/en-us/HT209605

Trust: 0.8

title:About the security content of watchOS 5.2url:https://support.apple.com/en-us/HT209602

Trust: 0.8

title:About the security content of iOS 12.2url:https://support.apple.com/en-us/HT209599

Trust: 0.8

title:About the security content of Xcode 10.2url:https://support.apple.com/en-us/HT209606

Trust: 0.8

title:About the security content of tvOS 12.2url:https://support.apple.com/en-us/HT209601

Trust: 0.8

title:About the security content of Safari 12.1url:https://support.apple.com/en-us/HT209603

Trust: 0.8

title:About the security content of iTunes 12.9.4 for Windowsurl:https://support.apple.com/en-us/HT209604

Trust: 0.8

title:Apple macOS Mojave Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=90385

Trust: 0.6

sources: ZDI: ZDI-19-289 // ZDI: ZDI-19-569 // JVNDB: JVNDB-2019-001923 // CNNVD: CNNVD-201903-941

EXTERNAL IDS

db:NVDid:CVE-2019-8519

Trust: 4.0

db:ZDIid:ZDI-19-289

Trust: 1.3

db:ZDIid:ZDI-19-569

Trust: 1.3

db:JVNid:JVNVU93236010

Trust: 0.8

db:JVNDBid:JVNDB-2019-001923

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-7604

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-8288

Trust: 0.7

db:CNNVDid:CNNVD-201903-941

Trust: 0.7

db:PACKETSTORMid:152222

Trust: 0.7

db:AUSCERTid:ESB-2019.0990

Trust: 0.6

db:VULHUBid:VHN-159954

Trust: 0.1

sources: ZDI: ZDI-19-289 // ZDI: ZDI-19-569 // VULHUB: VHN-159954 // JVNDB: JVNDB-2019-001923 // PACKETSTORM: 152222 // CNNVD: CNNVD-201903-941 // NVD: CVE-2019-8519

REFERENCES

url:https://support.apple.com/en-us/ht209600

Trust: 2.0

url:https://support.apple.com/ht209600

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2019-8519

Trust: 1.5

url:https://nvd.nist.gov/vuln/detail/cve-2019-8513

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-6207

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-8520

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-8522

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-6239

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-8526

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-8507

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-8533

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-8508

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-8537

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2019-8510

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6232

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8520

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8561

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6236

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8522

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8562

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6239

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8526

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8563

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8556

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8507

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8533

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8565

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8555

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8508

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8537

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8567

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8553

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8510

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8554

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8513

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8558

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6207

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8519

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8559

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93236010/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8553

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8558

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8559

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-6232

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8561

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-6236

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8562

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8563

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8565

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8567

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8556

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8555

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-8554

Trust: 0.8

url:https://support.apple.com/en-au/ht209600

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-28853

Trust: 0.6

url:https://www.auscert.org.au/bulletins/77806

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-569/

Trust: 0.6

url:https://packetstormsecurity.com/files/152222/apple-security-advisory-2019-3-25-2.html

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-19-289/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-8514

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8511

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8502

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8516

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18313

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-6237

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8540

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8527

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12015

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8517

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8521

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8504

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-7293

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8530

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8529

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-18311

Trust: 0.1

sources: ZDI: ZDI-19-289 // ZDI: ZDI-19-569 // VULHUB: VHN-159954 // JVNDB: JVNDB-2019-001923 // PACKETSTORM: 152222 // CNNVD: CNNVD-201903-941 // NVD: CVE-2019-8519

CREDITS

juwei lin(@panicaII), junzhi lu of TrendMicro Research

Trust: 0.7

sources: ZDI: ZDI-19-289

SOURCES

db:ZDIid:ZDI-19-289
db:ZDIid:ZDI-19-569
db:VULHUBid:VHN-159954
db:JVNDBid:JVNDB-2019-001923
db:PACKETSTORMid:152222
db:CNNVDid:CNNVD-201903-941
db:NVDid:CVE-2019-8519

LAST UPDATE DATE

2024-08-14T12:08:42.928000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-19-289date:2019-03-26T00:00:00
db:ZDIid:ZDI-19-569date:2019-06-13T00:00:00
db:VULHUBid:VHN-159954date:2019-12-26T00:00:00
db:JVNDBid:JVNDB-2019-001923date:2020-01-06T00:00:00
db:CNNVDid:CNNVD-201903-941date:2021-10-29T00:00:00
db:NVDid:CVE-2019-8519date:2019-12-26T19:56:34.580

SOURCES RELEASE DATE

db:ZDIid:ZDI-19-289date:2019-03-26T00:00:00
db:ZDIid:ZDI-19-569date:2019-06-13T00:00:00
db:VULHUBid:VHN-159954date:2019-12-18T00:00:00
db:JVNDBid:JVNDB-2019-001923date:2019-03-29T00:00:00
db:PACKETSTORMid:152222date:2019-03-26T14:40:53
db:CNNVDid:CNNVD-201903-941date:2019-03-26T00:00:00
db:NVDid:CVE-2019-8519date:2019-12-18T18:15:23.787