ID

VAR-201912-0613


CVE

CVE-2019-8605


TITLE

plural  Apple  Updates for vulnerabilities in products

Trust: 0.8

sources: JVNDB: JVNDB-2019-008170

DESCRIPTION

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1. A malicious application may be able to execute arbitrary code with system privileges. Failed exploit attempts will likely result in denial-of-service conditions. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple tvOS is a smart TV operating system. Apple macOS Mojave is a dedicated operating system developed for Mac computers. Kernel is one of the kernel components. A resource management error vulnerability exists in the Kernel component of several Apple products. This vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products. The following products and versions are affected: Apple iOS prior to 12.3; macOS Mojave prior to 10.14.5; tvOS prior to 12.3; watchOS prior to 5.2.1. Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2019-5-13-1 iOS 12.3 iOS 12.3 is now available and addresses the following: AppleFileConduit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8593: Dany Lisiansky (@DanyL931) Contacts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to read restricted memory Description: An input validation issue was addressed with improved input validation. CVE-2019-8598: Omer Gull of Checkpoint Research CoreAudio Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted movie file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8585: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative Disk Images Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-8560: Nikita Pupyshev of Bauman Moscow State Technological University Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A use after free issue was addressed with improved memory management. CVE-2019-8605: Ned Williamson working with Google Project Zero Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to cause unexpected system termination or read kernel memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-8576: Brandon Azad of Google Project Zero, unho Jang and Hanul Choi of LINE Security Team Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to cause unexpected system termination or write kernel memory Description: A type confusion issue was addressed with improved memory handling. CVE-2019-8591: Ned Williamson working with Google Project Zero Lock Screen Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A person with physical access to an iOS device may be able to see the email address used for iTunes Description: A logic issue was addressed with improved restrictions. CVE-2019-8599: Jeremy Peña-Lopez (aka Radio) of the University of North Florida Mail Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted message may lead to a denial of service Description: An input validation issue was addressed with improved input validation. CVE-2019-8626: Natalie Silvanovich of Google Project Zero Mail Message Framework Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to cause arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2019-8613: Natalie Silvanovich of Google Project Zero MobileInstallation Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to modify protected parts of the file system Description: A validation issue existed in the handling of symlinks. CVE-2019-8568: Dany Lisiansky (@DanyL931) MobileLockdown Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to gain root privileges Description: An input validation issue was addressed with improved input validation. CVE-2019-8637: Dany Lisiansky (@DanyL931) Photos Storage Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: An access issue was addressed with additional sandbox restrictions. CVE-2019-8617: an anonymous researcher SQLite Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to gain elevated privileges Description: An input validation issue was addressed with improved memory handling. CVE-2019-8577: Omer Gull of Checkpoint Research SQLite Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8600: Omer Gull of Checkpoint Research SQLite Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to read restricted memory Description: An input validation issue was addressed with improved input validation. CVE-2019-8598: Omer Gull of Checkpoint Research SQLite Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to elevate privileges Description: A memory corruption issue was addressed by removing the vulnerable code. CVE-2019-8602: Omer Gull of Checkpoint Research Status Bar Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: The lock screen may show a locked icon after unlocking Description: The issue was addressed with improved UI handling. CVE-2019-8630: Jon M. Morlan StreamingZip Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to modify protected parts of the file system Description: A validation issue existed in the handling of symlinks. CVE-2019-8568: Dany Lisiansky (@DanyL931) sysdiagnose Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8574: Dayton Pidhirney (@_watbulb) of Seekintoo (@seekintoo) WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may result in the disclosure of process memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8607: Junho Jang and Hanul Choi of LINE Security Team WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2019-6237: G. Geshev working with Trend Micro Zero Day Initiative, Liu Long of Qihoo 360 Vulcan Team CVE-2019-8571: 01 working with Trend Micro's Zero Day Initiative CVE-2019-8583: sakura of Tencent Xuanwu Lab, jessica (@babyjess1ca_) of Tencent Keen Lab, and dwfault working at ADLab of Venustech CVE-2019-8584: G. Geshev of MWR Labs working with Trend Micro Zero Day Initiative CVE-2019-8586: an anonymous researcher CVE-2019-8587: G. Geshev working with Trend Micro Zero Day Initiative CVE-2019-8594: Suyoung Lee and Sooel Son of KAIST Web Security & Privacy Lab and HyungSeok Han and Sang Kil Cha of KAIST SoftSec Lab CVE-2019-8595: G. Geshev from MWR Labs working with Trend Micro Zero Day Initiative CVE-2019-8596: Wen Xu of SSLab at Georgia Tech CVE-2019-8597: 01 working with Trend Micro Zero Day Initiative CVE-2019-8601: Fluoroacetate working with Trend Micro's Zero Day Initiative CVE-2019-8608: G. Geshev working with Trend Micro Zero Day Initiative CVE-2019-8609: Wen Xu of SSLab, Georgia Tech CVE-2019-8610: Anonymous working with Trend Micro Zero Day Initiative CVE-2019-8611: Samuel Groß of Google Project Zero CVE-2019-8615: G. Geshev from MWR Labs working with Trend Micro's Zero Day Initiative CVE-2019-8619: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of Chaitin Security Research Lab CVE-2019-8622: Samuel Groß of Google Project Zero CVE-2019-8623: Samuel Groß of Google Project Zero CVE-2019-8628: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of Chaitin Security Research Lab Wi-Fi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A device may be passively tracked by its WiFi MAC address Description: A user privacy issue was addressed by removing the broadcast MAC address. CVE-2019-8620: David Kreitschmann and Milan Stute of Secure Mobile Networking Lab at Technische Universität Darmstadt Additional recognition Clang We would like to acknowledge Brandon Azad of Google Project Zero for their assistance. CoreFoundation We would like to acknowledge Vozzie and Rami and m4bln, Xiangqian Zhang, Huiming Liu of Tencent's Xuanwu Lab for their assistance. Kernel We would like to acknowledge Brandon Azad of Google Project Zero and an anonymous researcher for their assistance. MediaLibrary We would like to acknowledge Angel Ramirez and Min (Spark) Zheng, Xiaolong Bai of Alibaba Inc. for their assistance. MobileInstallation We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance. Safari We would like to acknowledge Ben Guild (@benguild) for their assistance. Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 12.3". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlzZrUopHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3FJJxAA hLu4GEYEBPNLxDWhh49P7k7pe33N8cguJw2iPt6sYkF9swBwzL1AC1y0WiNJejGT Y0PPMG7evpaEVGQwCZvHarNT4g35OUeHdHy4gYAIPfTY15G25jmELL4YTJutWQ0O z6KseXhEq9EqpHKlsT5Q6QOEoUyXVHan33d+H9+4t/jQHFvDqMmwHWO7bKlYyhWW ctG8jbXSgy/OFjSrmbPhfbBfDXQHah8GsFGJAFtlWk+UtQhXNifJT1tj9XAKDtGK V5EQ/hYkYRyyeNPXLiZ/wn6Jesbg8QIrmZB2RHAl1w8XZZY2Gsd1//dTXqn1LkqK gwOV0+Vs//LJwIqix435KKc0ULMwJjIfKy9whzPyf+4lqcD4kx4OdQrakZz4+L7g 4ZZeeyJ0LFFnO4eavtn6lVrYcTXVhJlRkJ6cWZcf9Dfr28bPTSSHda1Nd9quZFJn QPFt7CHRPL1MelgfDKZNeTy7WUDnoTwbdMZCyd0MszCxCeaSahny7066jmfKyXGI OoQQyyz96OmBABcqG3WeCRSeJ3ymmoy2d+JzjA4boIHo4k+nq5ifKikyI8qiHIBB uS3K3DEzMSj/0u2vNcDMjQ6vogbxeWnK8fxCCxkfedYZEdHg4Oj4lK1HStbhweoJ cB3S2pWUIPt8HRcnbUYgypZ0ZJgtnTom+0mgi3a0+64= =fsAj -----END PGP SIGNATURE-----

Trust: 2.61

sources: NVD: CVE-2019-8605 // JVNDB: JVNDB-2019-008170 // BID: 108481 // VULHUB: VHN-160040 // VULMON: CVE-2019-8605 // PACKETSTORM: 152847 // PACKETSTORM: 152846 // PACKETSTORM: 154226 // PACKETSTORM: 154225 // PACKETSTORM: 152844 // PACKETSTORM: 154224

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:ltversion:10.14.5

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:5.2.1

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:12.3

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:12.3

Trust: 1.0

vendor:アップルmodel:watchosscope:ltversion:5.2.1 earlier

Trust: 0.8

vendor:アップルmodel:tvosscope: - version: -

Trust: 0.8

vendor:アップルmodel:apple mac os xscope: - version: -

Trust: 0.8

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

vendor:applemodel:iosscope:eqversion:30

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:watchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.2.1

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:5.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.2.5

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:5

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:12.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:12.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:12.1.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.2.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:neversion:12.3

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:12.1.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.2.2

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:watch hermesscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:12.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.14.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.3.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.1.1

Trust: 0.3

vendor:applemodel:tvosscope:neversion:12.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:40

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10

Trust: 0.3

vendor:applemodel:macos security updatescope:neversion:2019

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:12.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.13.6

Trust: 0.3

vendor:applemodel:macosscope:neversion:10.14.5

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.4.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:0

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:12.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:50

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:12.1.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:12

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.5

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:5.1.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:12.1.3

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11

Trust: 0.3

vendor:applemodel:watchosscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:macosscope:eqversion:10.12.6

Trust: 0.3

vendor:applemodel:watch editionscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.4

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:12

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:watchosscope:neversion:5.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:11.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:10.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:11.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:tvosscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

sources: BID: 108481 // JVNDB: JVNDB-2019-008170 // NVD: CVE-2019-8605

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-8605
value: HIGH

Trust: 1.0

NVD: CVE-2019-8605
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201905-526
value: HIGH

Trust: 0.6

VULHUB: VHN-160040
value: HIGH

Trust: 0.1

VULMON: CVE-2019-8605
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-8605
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-160040
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-8605
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-8605
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-160040 // VULMON: CVE-2019-8605 // JVNDB: JVNDB-2019-008170 // CNNVD: CNNVD-201905-526 // NVD: CVE-2019-8605

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.1

problemtype:Use of freed memory (CWE-416) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-160040 // JVNDB: JVNDB-2019-008170 // NVD: CVE-2019-8605

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201905-526

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201905-526

EXPLOIT AVAILABILITY

sources: VULMON: CVE-2019-8605

PATCH

title:About the security content of tvOS 12.4.1 Apple Security Updatesurl:https://support.apple.com/en-us/HT210548

Trust: 0.8

title:Multiple Apple product Kernel Fixes for component resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92682

Trust: 0.6

title:Apple: iOS 12.4.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=d4c4d99f8480b6209900b7574b8b26c6

Trust: 0.1

title:Apple: tvOS 12.4.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=62c0cc13a49bc02f95546584a0b2ed94

Trust: 0.1

title:Apple: macOS Mojave 10.14.6 Supplemental Updateurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=0a98d286db774fe5e521a12030c60af3

Trust: 0.1

title:Apple: watchOS 5.2.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=ab23a4de9a93961f13e23432abf4308b

Trust: 0.1

title:Apple: iOS 12.3url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=4103c2a6954dcb84b58d5a36aca4cf99

Trust: 0.1

title:Apple: tvOS 12.3url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=0289d65ca107fc8db443056f86ac71c5

Trust: 0.1

title:Apple: macOS Mojave 10.14.5, Security Update 2019-003 High Sierra, Security Update 2019-003 Sierraurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=6b53c6ca54a4e5a7dbf9ea2c6eed06de

Trust: 0.1

title:iOS-macOS-Vul-Analysis-Articlesurl:https://github.com/wnagzihxa1n/iOS-macOS-Vul-Analysis-Articles

Trust: 0.1

title:pocurl:https://github.com/5bhuv4n35h/poc

Trust: 0.1

title:jailbreak10.3.3url:https://github.com/WRFan/jailbreak10.3.3

Trust: 0.1

title:macOS-iOS-system-securityurl:https://github.com/houjingyi233/macOS-iOS-system-security

Trust: 0.1

title:sec-daily-2019url:https://github.com/alphaSeclab/sec-daily-2019

Trust: 0.1

title:Threatposturl:https://threatpost.com/emerging-apt-mounts-mass-iphone-surveillance-campaign/154192/

Trust: 0.1

title:The Registerurl:https://www.theregister.co.uk/2019/08/26/apple_fixes_ios124_jailbreak/

Trust: 0.1

title:Threatposturl:https://threatpost.com/apple-fixes-ios-flaw-that-opened-iphones-to-jailbreaks/147717/

Trust: 0.1

title:Threatposturl:https://threatpost.com/apple-ios-patch-blunder-iphones-jailbreaks/147519/

Trust: 0.1

title:BleepingComputerurl:https://www.bleepingcomputer.com/news/security/ios-124-jailbreak-released-after-apple-unpatches-older-bug/

Trust: 0.1

title:Threatposturl:https://threatpost.com/apple-patches-intel-side-channel-ios-macos/144743/

Trust: 0.1

sources: VULMON: CVE-2019-8605 // JVNDB: JVNDB-2019-008170 // CNNVD: CNNVD-201905-526

EXTERNAL IDS

db:NVDid:CVE-2019-8605

Trust: 4.3

db:BIDid:108481

Trust: 0.9

db:PACKETSTORMid:154226

Trust: 0.8

db:JVNid:JVNVU90057210

Trust: 0.8

db:JVNDBid:JVNDB-2019-008170

Trust: 0.8

db:PACKETSTORMid:152993

Trust: 0.7

db:CNNVDid:CNNVD-201905-526

Trust: 0.7

db:PACKETSTORMid:152847

Trust: 0.7

db:AUSCERTid:ESB-2019.1697

Trust: 0.6

db:AUSCERTid:ESB-2019.3247

Trust: 0.6

db:PACKETSTORMid:154224

Trust: 0.2

db:PACKETSTORMid:154225

Trust: 0.2

db:VULHUBid:VHN-160040

Trust: 0.1

db:EXPLOIT-DBid:46892

Trust: 0.1

db:VULMONid:CVE-2019-8605

Trust: 0.1

db:PACKETSTORMid:152846

Trust: 0.1

db:PACKETSTORMid:152844

Trust: 0.1

sources: VULHUB: VHN-160040 // VULMON: CVE-2019-8605 // BID: 108481 // JVNDB: JVNDB-2019-008170 // PACKETSTORM: 152847 // PACKETSTORM: 152846 // PACKETSTORM: 154226 // PACKETSTORM: 154225 // PACKETSTORM: 152844 // PACKETSTORM: 154224 // CNNVD: CNNVD-201905-526 // NVD: CVE-2019-8605

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-8605

Trust: 2.0

url:https://support.apple.com/ht210118

Trust: 1.8

url:https://support.apple.com/ht210119

Trust: 1.8

url:https://support.apple.com/ht210120

Trust: 1.8

url:https://support.apple.com/ht210122

Trust: 1.8

url:https://www.apple.com/

Trust: 0.9

url:http://www.apple.com/ios/

Trust: 0.9

url:http://www.apple.com/watchos-2/

Trust: 0.9

url:https://support.apple.com/en-us/ht210118

Trust: 0.9

url:https://support.apple.com/en-us/ht210119

Trust: 0.9

url:https://support.apple.com/en-us/ht210120

Trust: 0.9

url:https://support.apple.com/en-us/ht210122

Trust: 0.9

url:https://bugs.chromium.org/p/project-zero/issues/detail?id=1806

Trust: 0.9

url:https://jvn.jp/vu/jvnvu90057210/

Trust: 0.8

url:https://support.apple.com/kb/ht201222

Trust: 0.6

url:https://www.apple.com/support/security/pgp/

Trust: 0.6

url:https://support.apple.com/en-au/ht210122

Trust: 0.6

url:https://support.apple.com/en-au/ht210550

Trust: 0.6

url:https://support.apple.com/en-au/ht210548

Trust: 0.6

url:https://support.apple.com/en-au/ht210549

Trust: 0.6

url:https://www.securityfocus.com/bid/108481

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-ios-macos-use-after-free-30168

Trust: 0.6

url:https://support.apple.com/en-us/ht210550

Trust: 0.6

url:https://packetstormsecurity.com/files/154226/apple-security-advisory-2019-8-26-3.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/80842

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3247/

Trust: 0.6

url:https://packetstormsecurity.com/files/152993/xnu-stale-pointer-use-after-free.html

Trust: 0.6

url:https://packetstormsecurity.com/files/152847/apple-security-advisory-2019-5-13-4.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2019-8560

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8576

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8598

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8607

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8591

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8585

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8601

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8583

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8602

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8593

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8577

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8600

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8568

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8574

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8587

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8610

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-6237

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8595

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8584

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8596

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8608

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8586

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8597

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8571

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8594

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8609

Trust: 0.2

url:https://www.apple.com/itunes/

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/416.html

Trust: 0.1

url:https://www.exploit-db.com/exploits/46892

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/emerging-apt-mounts-mass-iphone-surveillance-campaign/154192/

Trust: 0.1

url:https://support.apple.com/kb/ht210549

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8626

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8620

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8613

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8623

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8637

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8622

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8611

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8599

Trust: 0.1

sources: VULHUB: VHN-160040 // VULMON: CVE-2019-8605 // BID: 108481 // JVNDB: JVNDB-2019-008170 // PACKETSTORM: 152847 // PACKETSTORM: 152846 // PACKETSTORM: 154226 // PACKETSTORM: 154225 // PACKETSTORM: 152844 // PACKETSTORM: 154224 // CNNVD: CNNVD-201905-526 // NVD: CVE-2019-8605

CREDITS

Apple

Trust: 0.6

sources: PACKETSTORM: 152847 // PACKETSTORM: 152846 // PACKETSTORM: 154226 // PACKETSTORM: 154225 // PACKETSTORM: 152844 // PACKETSTORM: 154224

SOURCES

db:VULHUBid:VHN-160040
db:VULMONid:CVE-2019-8605
db:BIDid:108481
db:JVNDBid:JVNDB-2019-008170
db:PACKETSTORMid:152847
db:PACKETSTORMid:152846
db:PACKETSTORMid:154226
db:PACKETSTORMid:154225
db:PACKETSTORMid:152844
db:PACKETSTORMid:154224
db:CNNVDid:CNNVD-201905-526
db:NVDid:CVE-2019-8605

LAST UPDATE DATE

2024-11-23T20:05:12.813000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-160040date:2019-12-20T00:00:00
db:VULMONid:CVE-2019-8605date:2019-12-20T00:00:00
db:BIDid:108481date:2019-05-13T00:00:00
db:JVNDBid:JVNDB-2019-008170date:2024-02-29T08:49:00
db:CNNVDid:CNNVD-201905-526date:2021-10-29T00:00:00
db:NVDid:CVE-2019-8605date:2024-11-21T04:50:09.573

SOURCES RELEASE DATE

db:VULHUBid:VHN-160040date:2019-12-18T00:00:00
db:VULMONid:CVE-2019-8605date:2019-12-18T00:00:00
db:BIDid:108481date:2019-05-13T00:00:00
db:JVNDBid:JVNDB-2019-008170date:2019-08-28T00:00:00
db:PACKETSTORMid:152847date:2019-05-14T00:29:10
db:PACKETSTORMid:152846date:2019-05-14T00:28:51
db:PACKETSTORMid:154226date:2019-08-27T13:28:23
db:PACKETSTORMid:154225date:2019-08-27T13:27:36
db:PACKETSTORMid:152844date:2019-05-14T00:27:53
db:PACKETSTORMid:154224date:2019-08-27T13:26:08
db:CNNVDid:CNNVD-201905-526date:2019-05-14T00:00:00
db:NVDid:CVE-2019-8605date:2019-12-18T18:15:28.833