ID

VAR-202002-0267


CVE

CVE-2019-8741


TITLE

plural Apple Service operation interruption in the product (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-014714

DESCRIPTION

A denial of service issue was addressed with improved input validation. plural Apple The product has a defect in the processing related to input confirmation, which interferes with service operation. (DoS) Vulnerability exists.Service operation interruption (DoS) It may be put into a state. Apple Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * Arbitrary code execution * Service operation interruption (DoS) * information leak * Authentication bypass * Access restriction avoidance. Apple tvOS and others are all products of Apple (Apple). Apple tvOS is a smart TV operating system. Apple iTunes for Windows is a media player application based on the Windows platform. Apple iCloud for Windows is a cloud service based on the Windows platform. The product supports storage of music, photos, App and contacts, etc. CoreCrypto is one of the core encryption components. A security vulnerability exists in the CoreCrypto component of several Apple products. The following products and versions are affected: Apple tvOS before 13; Windows-based iTunes before 12.10.1; iOS before 13; macOS Catalina before 10.15; watchOS 6 and earlier; Windows-based iCloud before 7.14. CVE-2019-8748: Lilang Wu and Moony Li of TrendMicro Mobile Security Research Team apache_mod_php Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: Multiple issues in PHP Description: Multiple issues were addressed by updating to PHP version 7.3.8. CVE-2019-8706: Yu Zhou of Ant-financial Light-Year Security Lab Entry added October 29, 2019 Books Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: Parsing a maliciously crafted iBooks file may lead to a persistent denial-of-service Description: A resource exhaustion issue was addressed with improved input validation. CVE-2019-8825: Found by GWP-ASan in Google Chrome Entry added October 29, 2019 Crash Reporter Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: The "Share Mac Analytics" setting may not be disabled when a user deselects the switch to share analytics Description: A race condition existed when reading and writing user preferences. CVE-2019-8757: William Cerniuk of Core Development, LLC CUPS Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: An attacker in a privileged network position may be able to leak sensitive user information Description: An input validation issue was addressed with improved input validation. CVE-2019-8767: Stephen Zeisberg Entry added October 29, 2019 CUPS Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: An attacker in a privileged position may be able to perform a denial of service attack Description: A denial of service issue was addressed with improved validation. CVE-2019-8758: Lilang Wu and Moony Li of Trend Micro IOGraphics Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: A malicious application may be able to determine kernel memory layout Description: A logic issue was addressed with improved restrictions. CVE-2019-8750: found by OSS-Fuzz Entry added October 29, 2019 mDNSResponder Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: An attacker in physical proximity may be able to passively observe device names in AWDL communications Description: This issue was resolved by replacing device names with a random identifier. CVE-2019-8730: Jamie Blumberg (@jamie_blumberg) of Virginia Polytechnic Institute and State University PDFKit Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: An attacker may be able to exfiltrate the contents of an encrypted PDF Description: An issue existed in the handling of links in encrypted PDFs. CVE-2019-8701: Simon Huang(@HuangShaomang), Rong Fan(@fanrong1992) and pjf of IceSword Lab of Qihoo 360 UIFoundation Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: Parsing a maliciously crafted text file may lead to disclosure of user information Description: This issue was addressed with improved checks. Diaz (coldpointblue) WebKit Available for: MacBook (Early 2015 and later), MacBook Air (Mid 2012 and later), MacBook Pro (Mid 2012 and later), Mac mini (Late 2012 and later), iMac (Late 2012 and later), iMac Pro (all models), Mac Pro (Late 2013 and later) Impact: Visiting a maliciously crafted website may reveal browsing history Description: An issue existed in the drawing of web page elements. boringssl We would like to acknowledge Nimrod Aviram of Tel Aviv University, Robert Merget of Ruhr University Bochum, Juraj Somorovsky of Ruhr University Bochum and Thijs Alkemade (@xnyhps) of Computest for their assistance. Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2019-10-29-6 Additional information for APPLE-SA-2019-9-26-3 iOS 13 iOS 13 addresses the following: Bluetooth Available for: iPhone 6s and later Impact: Notification previews may show on Bluetooth accessories even when previews are disabled Description: A logic issue existed with the display of notification previews. CVE-2019-8711: Arjang of MARK ANTHONY GROUP INC., Cemil Ozkebapci (@cemilozkebapci) of Garanti BBVA, Oguzhan Meral of Deloitte Consulting, Ömer Bozdoğan-Ramazan Atıl Anadolu Lisesi Adana/TÜRKİYE CFNetwork Available for: iPhone 6s and later Impact: Processing maliciously crafted web content may lead to a cross site scripting attack Description: This issue was addressed with improved checks. CVE-2019-8753: Łukasz Pilorz of Standard Chartered GBS Poland Entry added October 29, 2019 CoreAudio Available for: iPhone 6s and later Impact: Processing a maliciously crafted movie may result in the disclosure of process memory Description: A memory corruption issue was addressed with improved validation. CVE-2019-8741: Nicky Mouha of NIST Entry added October 29, 2019 CoreMedia Available for: iPhone 6s and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2019-8825: Found by GWP-ASan in Google Chrome Entry added October 29, 2019 Face ID Available for: iPhone 6s and later Impact: A 3D model constructed to look like the enrolled user may authenticate via Face ID Description: This issue was addressed by improving Face ID machine learning models. CVE-2019-8760: Wish Wu (吴潍浠 @wish_wu) of Ant-financial Light-Year Security Lab Foundation Available for: iPhone 6s and later Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8641: Samuel Groß and Natalie Silvanovich of Google Project Zero CVE-2019-8746: Natalie Silvanovich and Samuel Groß of Google Project Zero Entry added October 29, 2019 IOUSBDeviceFamily Available for: iPhone 6s and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8718: Joshua Hill and Sem Voigtländer Entry added October 29, 2019 Kernel Available for: iPhone 6s and later Impact: A local app may be able to read a persistent account identifier Description: A validation issue was addressed with improved logic. CVE-2019-8809: Apple Entry added October 29, 2019 Kernel Available for: iPhone 6s and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2019-8709: derrek (@derrekr6) [confirmed]derrek (@derrekr6) Entry added October 29, 2019 Kernel Available for: iPhone 6s and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8717: Jann Horn of Google Project Zero Entry added October 29, 2019 Kernel Available for: iPhone 6s and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8712: Mohamed Ghannam (@_simo36) Entry added October 29, 2019 Kernel Available for: iPhone 6s and later Impact: A malicious application may be able to determine kernel memory layout Description: A memory corruption issue existed in the handling of IPv6 packets. CVE-2019-8744: Zhuo Liang of Qihoo 360 Vulcan Team Entry added October 29, 2019 Keyboards Available for: iPhone 6s and later Impact: A local user may be able to leak sensitive user information Description: An authentication issue was addressed with improved state management. CVE-2019-8704: 王 邦 宇 (wAnyBug.Com) of SAINTSEC libxml2 Available for: iPhone 6s and later Impact: Multiple issues in libxml2 Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2019-8749: found by OSS-Fuzz CVE-2019-8756: found by OSS-Fuzz Entry added October 29, 2019 Messages Available for: iPhone 6s and later Impact: A person with physical access to an iOS device may be able to access contacts from the lock screen Description: The issue was addressed by restricting options offered on a locked device. CVE-2019-8742: videosdebarraquito Notes Available for: iPhone 6s and later Impact: A local user may be able to view a user's locked notes Description: The contents of locked notes sometimes appeared in search results. CVE-2019-8730: Jamie Blumberg (@jamie_blumberg) of Virginia Polytechnic Institute and State University Entry added October 29, 2019 PluginKit Available for: iPhone 6s and later Impact: A local user may be able to check for the existence of arbitrary files Description: A logic issue was addressed with improved restrictions. CVE-2019-8708: an anonymous researcher Entry added October 29, 2019 PluginKit Available for: iPhone 6s and later Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8715: an anonymous researcher Entry added October 29, 2019 Quick Look Available for: iPhone 6s and later Impact: Processing a maliciously crafted file may disclose user information Description: A permissions issue existed in which execute permission was incorrectly granted. CVE-2019-8731: Saif Hamed Hamdan Al Hinai of Oman National CERT, Yiğit Can YILMAZ (@yilmazcanyigit) Safari Available for: iPhone 6s and later Impact: Visiting a malicious website may lead to address bar spoofing Description: A logic issue was addressed with improved state management. CVE-2019-8727: Divyanshu Shukla (@justm0rph3u5) UIFoundation Available for: iPhone 6s and later Impact: Processing a maliciously crafted text file may lead to arbitrary code execution Description: A buffer overflow was addressed with improved bounds checking. CVE-2019-8745: riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative Entry added October 29, 2019 WebKit Available for: iPhone 6s and later Impact: Maliciously crafted web content may violate iframe sandboxing policy Description: This issue was addressed with improved iframe sandbox enforcement. CVE-2019-8771: Eliya Stein of Confiant Entry added October 29, 2019 WebKit Available for: iPhone 6s and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2019-8707: an anonymous researcher working with Trend Micro's Zero Day Initiative, cc working with Trend Micro Zero Day Initiative CVE-2019-8726: Jihui Lu of Tencent KeenLab CVE-2019-8728: Junho Jang of LINE Security Team and Hanul Choi of ABLY Corporation CVE-2019-8733: Sergei Glazunov of Google Project Zero CVE-2019-8734: found by OSS-Fuzz CVE-2019-8735: G. Geshev working with Trend Micro Zero Day Initiative Entry added October 29, 2019 WebKit Available for: iPhone 6s and later Impact: A user may be unable to delete browsing history items Description: "Clear History and Website Data" did not clear the history. CVE-2019-8768: Hugo S. Diaz (coldpointblue) Entry added October 29, 2019 WebKit Available for: iPhone 6s and later Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved state management. CVE-2019-8625: Sergei Glazunov of Google Project Zero CVE-2019-8719: Sergei Glazunov of Google Project Zero CVE-2019-8764: Sergei Glazunov of Google Project Zero Entry added October 29, 2019 WebKit Page Loading Available for: iPhone 6s and later Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved state management. CVE-2019-8674: Sergei Glazunov of Google Project Zero Additional recognition AppleRTC We would like to acknowledge Vitaly Cheptsov for their assistance. Audio We would like to acknowledge riusksk of VulWar Corp working with Trend Micro's Zero Day Initiative for their assistance. Bluetooth We would like to acknowledge Jan Ruge of TU Darmstadt, Secure Mobile Networking Lab, Jiska Classen of TU Darmstadt, Secure Mobile Networking Lab, Francesco Gringoli of University of Brescia, Dennis Heinze of TU Darmstadt, Secure Mobile Networking Lab for their assistance. boringssl We would like to acknowledge Thijs Alkemade (@xnyhps) of Computest for their assistance. Control Center We would like to acknowledge Brandon Sellers for their assistance. HomeKit We would like to acknowledge Tian Zhang for their assistance. Kernel We would like to acknowledge Brandon Azad of Google Project Zero for their assistance. Keyboard We would like to acknowledge an anonymous researcher for their assistance. Mail We would like to acknowledge Kenneth Hyndycz for their assistance. mDNSResponder We would like to acknowledge Gregor Lang of e.solutions GmbH for their assistance. Profiles We would like to acknowledge Erik Johnson of Vernon Hills High School and James Seeley (@Code4iOS) of Shriver Job Corps for their assistance. SafariViewController We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance. VPN We would like to acknowledge Royce Gawron of Second Son Consulting, Inc. for their assistance. WebKit We would like to acknowledge MinJeong Kim of Information Security Lab, Chungnam National University, JaeCheol Ryou of the Information Security Lab, Chungnam National University in South Korea, Yiğit Can YILMAZ (@yilmazcanyigit), Zhihua Yao of DBAPPSecurity Zion Lab, an anonymous researcher, and cc working with Trend Micro's Zero Day Initiative for their assistance. Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 13". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEM5FaaFRjww9EJgvRBz4uGe3y0M0FAl24s3oACgkQBz4uGe3y 0M1GMxAAnwBO9htU2i7+SHsXiEt2xJbjilLMM9V5LObjUWqaHXOxdQuYiPxFy9lR neTOHwR2z1f3L3UPkGut28i24w7fwHVBdFh7w5p5RXlBf7tcRmFhKBUkYIhQ90Qj jO6DXiCL9InCBVs2nW9Fr4yYV13kdoES6MfguyldGVpQMkyUcZ3F2XK0RCHNqEgz h+1dR/uws3Ce+HNbb7wnqe4UzAI5DJUR/vH98+fWTl5P6CCaoZrv53vaxErLRBXi gn/4rtzw+wDlThlrpkE5MwxmvLMF2ZqjUhOSVzKb3qXK+RFgE9FH8SKEBKkCxAa+ 8/vZu+zdbN6KCzO608TXH9rNO2LbtQqTlO/jHGTJ30UEaKo9PyFozGkCE6XkWmFU xtayVkSL08drJEgm+CB80g//hr2CESF0fMHFe8yQYeN2uL5yQxoavyub8E/nPKn1 v32Z6Z2fpGzP3eCLYbV93cBcdJaeXTdib47vvodyYFfFEja7xrv0AvPAbSSm98DK VtFw3eNAKRbmIEAeY4b1uhdB+qUiqMEWqh0sd97+chY2Do90/4IG/3caLc0pTpDt huDUQs/IbSujrdjCWSfz35qU4u9sxPpM8wQR2M7mdfY9qGp+Xgfh/MprSZ4wOuS3 PAAs5Pdr9GfymsB+CDpMEr+DiTOza6SUjIadZ+j2FWaklzg7h1A= =NYIZ -----END PGP SIGNATURE-----

Trust: 2.79

sources: NVD: CVE-2019-8741 // JVNDB: JVNDB-2019-014714 // JVNDB: JVNDB-2019-010288 // VULHUB: VHN-160176 // PACKETSTORM: 155061 // PACKETSTORM: 155066 // PACKETSTORM: 155064 // PACKETSTORM: 155062

AFFECTED PRODUCTS

vendor:applemodel:watchosscope:ltversion:6.0

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:12.10.1

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:7.14

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:13

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:10.7

Trust: 1.0

vendor:applemodel:icloudscope:gteversion:10.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:13.0

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:13 未満 (apple tv hd)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15 未満 (mac mini (late 2012 以降))

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15 未満 (macbook air (mid 2012 以降))

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15 未満 (mac pro (late 2013 以降))

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15 未満 (macbook pro (mid 2012 以降))

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:for icloud 7.14 未満 (windows 7 以降)

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:13 未満 (apple tv 4k)

Trust: 0.8

vendor:applemodel:watchosscope:eqversion:6 未満 (apple watch series 3 以降)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15 未満 (macbook (early 2015 以降))

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13 未満 (iphone 6s 以降)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15 未満 (imac (late 2012 以降))

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:for windows 12.10.1 未満 (windows 7 以降)

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:for icloud 10.7 未満 (windows 10 以降)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15 未満 (imac pro (全モデル))

Trust: 0.8

vendor:applemodel:icloudscope:ltversion:for windows 10.7 earlier

Trust: 0.8

vendor:applemodel:icloudscope:ltversion:for windows 7.14 earlier

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:12.10.1 for windows earlier

Trust: 0.8

vendor:applemodel:macos catalinascope:ltversion:10.15 earlier

Trust: 0.8

sources: JVNDB: JVNDB-2019-014714 // JVNDB: JVNDB-2019-010288 // NVD: CVE-2019-8741

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-8741
value: HIGH

Trust: 1.0

NVD: JVNDB-2019-014714
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201911-009
value: HIGH

Trust: 0.6

VULHUB: VHN-160176
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2019-8741
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2019-014714
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-160176
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-8741
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2019-014714
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-160176 // JVNDB: JVNDB-2019-014714 // CNNVD: CNNVD-201911-009 // NVD: CVE-2019-8741

PROBLEMTYPE DATA

problemtype:CWE-835

Trust: 1.9

sources: VULHUB: VHN-160176 // JVNDB: JVNDB-2019-014714 // NVD: CVE-2019-8741

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201911-009

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201911-009

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-014714

PATCH

title:HT210635url:https://support.apple.com/en-us/HT210635

Trust: 1.6

title:HT210636url:https://support.apple.com/en-us/HT210636

Trust: 1.6

title:HT210637url:https://support.apple.com/en-us/HT210637

Trust: 1.6

title:HT210634url:https://support.apple.com/en-us/HT210634

Trust: 1.6

title:HT210604url:https://support.apple.com/en-us/HT210604

Trust: 0.8

title:HT210606url:https://support.apple.com/en-us/HT210606

Trust: 0.8

title:HT210607url:https://support.apple.com/en-us/HT210607

Trust: 0.8

title:HT210636url:https://support.apple.com/ja-jp/HT210636

Trust: 0.8

title:HT210637url:https://support.apple.com/ja-jp/HT210637

Trust: 0.8

title:HT210604url:https://support.apple.com/ja-jp/HT210604

Trust: 0.8

title:HT210606url:https://support.apple.com/ja-jp/HT210606

Trust: 0.8

title:HT210607url:https://support.apple.com/ja-jp/HT210607

Trust: 0.8

title:HT210634url:https://support.apple.com/ja-jp/HT210634

Trust: 0.8

title:HT210635url:https://support.apple.com/ja-jp/HT210635

Trust: 0.8

title:Multiple Apple product CoreCrypto Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=101154

Trust: 0.6

sources: JVNDB: JVNDB-2019-014714 // JVNDB: JVNDB-2019-010288 // CNNVD: CNNVD-201911-009

EXTERNAL IDS

db:NVDid:CVE-2019-8741

Trust: 2.9

db:JVNid:JVNVU90484857

Trust: 1.6

db:JVNid:JVNVU98778455

Trust: 0.8

db:JVNDBid:JVNDB-2019-014714

Trust: 0.8

db:JVNDBid:JVNDB-2019-010288

Trust: 0.8

db:CNNVDid:CNNVD-201911-009

Trust: 0.7

db:PACKETSTORMid:155066

Trust: 0.7

db:VULHUBid:VHN-160176

Trust: 0.1

db:PACKETSTORMid:155061

Trust: 0.1

db:PACKETSTORMid:155064

Trust: 0.1

db:PACKETSTORMid:155062

Trust: 0.1

sources: VULHUB: VHN-160176 // JVNDB: JVNDB-2019-014714 // JVNDB: JVNDB-2019-010288 // PACKETSTORM: 155061 // PACKETSTORM: 155066 // PACKETSTORM: 155064 // PACKETSTORM: 155062 // CNNVD: CNNVD-201911-009 // NVD: CVE-2019-8741

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-8741

Trust: 1.8

url:https://eprint.iacr.org/2019/1421

Trust: 1.7

url:https://support.apple.com/ht210604

Trust: 1.7

url:https://support.apple.com/ht210606

Trust: 1.7

url:https://support.apple.com/ht210607

Trust: 1.7

url:https://support.apple.com/ht210634

Trust: 1.7

url:https://support.apple.com/ht210635

Trust: 1.7

url:https://support.apple.com/ht210636

Trust: 1.7

url:https://support.apple.com/ht210637

Trust: 1.7

url:https://jvn.jp/vu/jvnvu90484857/

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-8741

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98778455/

Trust: 0.8

url:https://support.apple.com/en-us/ht210637

Trust: 0.6

url:https://packetstormsecurity.com/files/155066/apple-security-advisory-2019-10-29-10.html

Trust: 0.6

url:https://support.apple.com/en-us/ht210636

Trust: 0.6

url:https://support.apple.com/kb/ht201222

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8717

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8744

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8746

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8745

Trust: 0.4

url:https://www.apple.com/support/security/pgp/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8749

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8709

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8705

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-8753

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8706

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8728

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8734

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8712

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8718

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-8735

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8710

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8750

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8719

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8733

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8625

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8752

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8751

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8707

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8740

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8704

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8726

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8730

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8708

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8756

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8715

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8641

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-8747

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11042

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-11041

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8757

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8701

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8736

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8509

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12153

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8758

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8737

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12154

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8755

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-12152

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8773

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8809

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8799

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8727

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8711

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8742

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8674

Trust: 0.1

sources: VULHUB: VHN-160176 // JVNDB: JVNDB-2019-014714 // JVNDB: JVNDB-2019-010288 // PACKETSTORM: 155061 // PACKETSTORM: 155066 // PACKETSTORM: 155064 // PACKETSTORM: 155062 // CNNVD: CNNVD-201911-009 // NVD: CVE-2019-8741

CREDITS

Apple

Trust: 1.0

sources: PACKETSTORM: 155061 // PACKETSTORM: 155066 // PACKETSTORM: 155064 // PACKETSTORM: 155062 // CNNVD: CNNVD-201911-009

SOURCES

db:VULHUBid:VHN-160176
db:JVNDBid:JVNDB-2019-014714
db:JVNDBid:JVNDB-2019-010288
db:PACKETSTORMid:155061
db:PACKETSTORMid:155066
db:PACKETSTORMid:155064
db:PACKETSTORMid:155062
db:CNNVDid:CNNVD-201911-009
db:NVDid:CVE-2019-8741

LAST UPDATE DATE

2024-08-14T12:50:38.282000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-160176date:2020-04-01T00:00:00
db:JVNDBid:JVNDB-2019-014714date:2020-03-12T00:00:00
db:JVNDBid:JVNDB-2019-010288date:2019-10-10T00:00:00
db:CNNVDid:CNNVD-201911-009date:2021-11-03T00:00:00
db:NVDid:CVE-2019-8741date:2020-04-01T14:06:03.653

SOURCES RELEASE DATE

db:VULHUBid:VHN-160176date:2020-02-28T00:00:00
db:JVNDBid:JVNDB-2019-014714date:2020-03-12T00:00:00
db:JVNDBid:JVNDB-2019-010288date:2019-10-10T00:00:00
db:PACKETSTORMid:155061date:2019-11-01T17:08:00
db:PACKETSTORMid:155066date:2019-11-01T17:10:40
db:PACKETSTORMid:155064date:2019-11-01T17:09:58
db:PACKETSTORMid:155062date:2019-11-01T17:08:23
db:CNNVDid:CNNVD-201911-009date:2019-11-01T00:00:00
db:NVDid:CVE-2019-8741date:2020-02-28T14:15:10.140