You are here
Home > Preporuke > Nadogradnja za operacijske sustave macOS Sierra, macOS High Sierra i macOS Mojave

Nadogradnja za operacijske sustave macOS Sierra, macOS High Sierra i macOS Mojave

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: M
  • Kategorije: APL

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update
2019-004 High Sierra, Security Update 2019-004 Sierra

macOS Mojave 10.14.6, Security Update 2019-004 High Sierra,
Security Update 2019-004 Sierra are now available and address the
following:

AppleGraphicsControl
Available for: macOS Mojave 10.14.5
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input
sanitization.
CVE-2019-8693: Arash Tohidi of Solita

autofs
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: Extracting a zip file containing a symbolic link to an
endpoint in an NFS mount that is attacker controlled may bypass
Gatekeeper
Description: This was addressed with additional checks by Gatekeeper
on files mounted through a network share.
CVE-2019-8656: Filippo Cavallarin

Bluetooth
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: A remote attacker may be able to cause arbitrary code
execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2018-19860

Carbon Core
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to cause arbitrary code
execution
Description: A use after free issue was addressed with improved
memory management.
CVE-2019-8661: Natalie Silvanovich of Google Project Zero

Core Data
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to leak memory
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2019-8646: Natalie Silvanovich of Google Project Zero

Core Data
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2019-8660: Samuel Groß and Natalie Silvanovich of Google Project
Zero

Disk Management
Available for: macOS Mojave 10.14.5
Impact: An application may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2019-8697: ccpwd working with Trend Micro’s Zero Day Initiative

FaceTime
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to cause arbitrary code
execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu

Found in Apps
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to leak memory
Description: This issue was addressed with improved checks.
CVE-2019-8663: Natalie Silvanovich of Google Project Zero

Foundation
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: A remote attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2019-8641: Samuel Groß and Natalie Silvanovich of Google Project
Zero

Grapher
Available for: macOS Mojave 10.14.5
Impact: An application may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2019-8695: riusksk of VulWar Corp working with Trend Micro’s Zero
Day Initiative

Graphics Drivers
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.5
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input
sanitization.
CVE-2019-8691: Aleksandr Tarasikov (@astarasikov), Arash Tohidi of
Solita, Lilang Wu and Moony Li of Trend Micro
CVE-2019-8692: Lilang Wu and Moony Li of Trend Micro

Heimdal
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: An issue existed in Samba that may allow attackers to perform
unauthorized actions by intercepting communications between services
Description: This issue was addressed with improved checks to prevent
unauthorized actions.
CVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team
and Catalyst

IOAcceleratorFamily
Available for: macOS Mojave 10.14.5
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2019-8694: Arash Tohidi of Solita

libxslt
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: A remote attacker may be able to view sensitive information
Description: A stack overflow was addressed with improved input
validation.
CVE-2019-13118: found by OSS-Fuzz

Quick Look
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: An attacker may be able to trigger a use-after-free in an
application deserializing an untrusted NSDictionary
Description: This issue was addressed with improved checks.
CVE-2019-8662: Natalie Silvanovich and Samuel Groß of Google Project
Zero

Safari
Available for: macOS Mojave 10.14.5
Impact: Visiting a malicious website may lead to address bar spoofing
Description: An inconsistent user interface issue was addressed with
improved state management.
CVE-2019-8670: Tsubasa FUJII (@reinforchu)

Security
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6
Impact: An application may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2019-8697: ccpwd working with Trend Micro’s Zero Day Initiative

Siri
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to leak memory
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2019-8646: Natalie Silvanovich of Google Project Zero

Time Machine
Available for: macOS Mojave 10.14.5
Impact: The encryption status of a Time Machine backup may be
incorrect
Description: An inconsistent user interface issue was addressed with
improved state management.
CVE-2019-8667: Roland Kletzing of cyber:con GmbH

UIFoundation
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: Parsing a maliciously crafted office document may lead to an
unexpected application termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2019-8657: riusksk of VulWar Corp working with Trend Micro’s Zero
Day Initiative

Additional recognition

Classroom
We would like to acknowledge Jeff Johnson of underpassapp.com <http://underpassapp.com/> for
their assistance.

Game Center
We would like to acknowledge Min (Spark) Zheng and Xiaolong Bai of
Alibaba Inc. for their assistance.

Installation note:

macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, and
Security Update 2019-004 Sierra may be obtained from the
Mac App Store or Apple’s Software Downloads web site:
https://support.apple.com/downloads/ <https://support.apple.com/downloads/>

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222 <https://support.apple.com/kb/HT201222>

This message is signed with Apple’s Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/ <https://www.apple.com/support/security/pgp/>
—–BEGIN PGP SIGNATURE—–
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=Meho
—–END PGP SIGNATURE—–<html><head><meta http-equiv=”Content-Type” content=”text/html; charset=utf-8″></head><body style=”word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;” class=””>—–BEGIN PGP SIGNED MESSAGE—–<br class=””>Hash: SHA256<br class=””><br class=””>APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update<br class=””>2019-004 High Sierra, Security Update 2019-004 Sierra<br class=””><br class=””>macOS Mojave 10.14.6, Security Update 2019-004 High Sierra,<br class=””>Security Update 2019-004 Sierra are now available and address the<br class=””>following:<br class=””><br class=””>AppleGraphicsControl<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: An application may be able to read restricted memory<br class=””>Description: A validation issue was addressed with improved input<br class=””>sanitization.<br class=””>CVE-2019-8693: Arash Tohidi of Solita<br class=””><br class=””>autofs<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: Extracting a zip file containing a symbolic link to an<br class=””>endpoint in an NFS mount that is attacker controlled may bypass<br class=””>Gatekeeper<br class=””>Description: This was addressed with additional checks by Gatekeeper<br class=””>on files mounted through a network share.<br class=””>CVE-2019-8656: Filippo Cavallarin<br class=””><br class=””>Bluetooth<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause arbitrary code<br class=””>execution<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>input validation.<br class=””>CVE-2018-19860<br class=””><br class=””>Carbon Core<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause arbitrary code<br class=””>execution<br class=””>Description: A use after free issue was addressed with improved<br class=””>memory management.<br class=””>CVE-2019-8661: Natalie Silvanovich of Google Project Zero<br class=””><br class=””>Core Data<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to leak memory<br class=””>Description: An out-of-bounds read was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-8646: Natalie Silvanovich of Google Project Zero<br class=””><br class=””>Core Data<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause unexpected application<br class=””>termination or arbitrary code execution<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>input validation.<br class=””>CVE-2019-8660: Samuel Groß and Natalie Silvanovich of Google Project<br class=””>Zero<br class=””><br class=””>Disk Management<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: An application may be able to execute arbitrary code with<br class=””>system privileges<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>memory handling.<br class=””>CVE-2019-8697: ccpwd working with Trend Micro’s Zero Day Initiative<br class=””><br class=””>FaceTime<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause arbitrary code<br class=””>execution<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>input validation.<br class=””>CVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu<br class=””><br class=””>Found in Apps<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to leak memory<br class=””>Description: This issue was addressed with improved checks.<br class=””>CVE-2019-8663: Natalie Silvanovich of Google Project Zero<br class=””><br class=””>Foundation<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause unexpected application<br class=””>termination or arbitrary code execution<br class=””>Description: An out-of-bounds read was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-8641: Samuel Groß and Natalie Silvanovich of Google Project<br class=””>Zero<br class=””><br class=””>Grapher<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: An application may be able to execute arbitrary code with<br class=””>system privileges<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>memory handling.<br class=””>CVE-2019-8695: riusksk of VulWar Corp working with Trend Micro’s Zero<br class=””>Day Initiative<br class=””><br class=””>Graphics Drivers<br class=””>Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.5<br class=””>Impact: An application may be able to read restricted memory<br class=””>Description: A validation issue was addressed with improved input<br class=””>sanitization.<br class=””>CVE-2019-8691: Aleksandr Tarasikov (@astarasikov), Arash Tohidi of<br class=””>Solita, Lilang Wu and Moony Li of Trend Micro<br class=””>CVE-2019-8692: Lilang Wu and Moony Li of Trend Micro<br class=””><br class=””>Heimdal<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: An issue existed in Samba that may allow attackers to perform<br class=””>unauthorized actions by intercepting communications between services<br class=””>Description: This issue was addressed with improved checks to prevent<br class=””>unauthorized actions.<br class=””>CVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team<br class=””>and Catalyst<br class=””><br class=””>IOAcceleratorFamily<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: An application may be able to execute arbitrary code with<br class=””>kernel privileges<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>memory handling.<br class=””>CVE-2019-8694: Arash Tohidi of Solita<br class=””><br class=””>libxslt<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to view sensitive information<br class=””>Description: A stack overflow was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-13118: found by OSS-Fuzz<br class=””><br class=””>Quick Look<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: An attacker may be able to trigger a use-after-free in an<br class=””>application deserializing an untrusted NSDictionary<br class=””>Description: This issue was addressed with improved checks.<br class=””>CVE-2019-8662: Natalie Silvanovich and Samuel Groß of Google Project<br class=””>Zero<br class=””><br class=””>Safari<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: Visiting a malicious website may lead to address bar spoofing<br class=””>Description: An inconsistent user interface issue was addressed with<br class=””>improved state management.<br class=””>CVE-2019-8670: Tsubasa FUJII (@reinforchu)<br class=””><br class=””>Security<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6<br class=””>Impact: An application may be able to execute arbitrary code with<br class=””>system privileges<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>memory handling.<br class=””>CVE-2019-8697: ccpwd working with Trend Micro’s Zero Day Initiative<br class=””><br class=””>Siri<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to leak memory<br class=””>Description: An out-of-bounds read was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-8646: Natalie Silvanovich of Google Project Zero<br class=””><br class=””>Time Machine<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: The encryption status of a Time Machine backup may be<br class=””>incorrect<br class=””>Description: An inconsistent user interface issue was addressed with<br class=””>improved state management.<br class=””>CVE-2019-8667: Roland Kletzing of cyber:con GmbH<br class=””><br class=””>UIFoundation<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: Parsing a maliciously crafted office document may lead to an<br class=””>unexpected application termination or arbitrary code execution<br class=””>Description: An out-of-bounds read was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-8657: riusksk of VulWar Corp working with Trend Micro’s Zero<br class=””>Day Initiative<br class=””><br class=””>Additional recognition<br class=””><br class=””>Classroom<br class=””>We would like to acknowledge Jeff Johnson of <a href=”http://underpassapp.com” class=””>underpassapp.com</a> for<br class=””>their assistance.<br class=””><br class=””>Game Center<br class=””>We would like to acknowledge Min (Spark) Zheng and Xiaolong Bai of<br class=””>Alibaba Inc. for their assistance.<br class=””><br class=””>Installation note:<br class=””><br class=””>macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, and<br class=””>Security Update 2019-004 Sierra may be obtained from the<br class=””>Mac App Store or Apple’s Software Downloads web site:<br class=””><a href=”https://support.apple.com/downloads/” class=””>https://support.apple.com/downloads/</a><br class=””><br class=””>Information will also be posted to the Apple Security Updates<br class=””>web site: <a href=”https://support.apple.com/kb/HT201222″ class=””>https://support.apple.com/kb/HT201222</a><br class=””><br class=””>This message is signed with Apple’s Product Security PGP key,<br class=””>and details are available at:<br class=””><a href=”https://www.apple.com/support/security/pgp/” class=””>https://www.apple.com/support/security/pgp/</a><br class=””>—–BEGIN PGP SIGNATURE—–<br class=””><br class=””>iQIzBAEBCAAdFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAl01+gkACgkQeC9tht7T<br class=””>K3FK+RAAvFqlMsRnBWbACjgR3mBJb9Q0I/Sszh4a0LEqiiomyvfhgOQIu01UiE1v<br class=””>1P0WOAkAoNUn4sxyWPEKfsi/l8U1JG+NBu+zMVqUnG48wmAkMcBib0/FZwGO1Vo3<br class=””>czV8x8c4lupiIaksGeWxJQ9VKE7BaFttrCQrbEbg2sh5IHRRcyjzao2qGTItw5Xp<br class=””>EKGccuSbBV8njb38L0ITiByMAOxRU9IYHGK0gV7zT9VmWp7sHSFn1aoLehnH7aCq<br class=””>fohWNFRGjb6BtkSnqQvDidaLEcCCgvelUd+EhwpSm+L4lsmTM/+Ae8TE5G/2Fx+s<br class=””>3wWCfBCx7Y10HRkSv+4fnuJb+aisGxD5q3gbcqJINLx39Jc4oaMyY+xuM30uXn+C<br class=””>vs8Sd705rcNGIKPb0tkEnoXwuptCmp+YqBMjE/MhmYdxGWhxzd3CW9g453yz3WOg<br class=””>2rpM0Emh6+BIgyBP9tJ08FZL46paKZeGq3VmFz8DRP+POQsnpVMV+LCQm6kfhOEo<br class=””>Id0y+zmfhs6BqlrmbC7djnx5ptLJsEIvgNIyHj9oBoZOXt6RFRBzfEkie4ToylhA<br class=””>wjlZxngc6OOtgrQHiSFRC3qaSm2Eb2bCA/8yTkKkqsxsqQYFXgXhuzAGoXBBRNRZ<br class=””>uUGtetOl6R3STIMg8pgof/c+QpFkHeHPgKf5+J71J5vCu1aPF34=<br class=””>=Meho<br class=””>—–END PGP SIGNATURE—–</body></html> _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce@lists.apple.com)
Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/security-announce/advinp%40cert.hr

This email sent to advinp@cert.hr

AutorToni Vugdelija
Cert idNCERT-REF-2019-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci jezgre operacijskog sustava Ubuntu. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja, otkrivanje osjetljivih informacija ili...

Close