—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update
2019-004 High Sierra, Security Update 2019-004 Sierra
macOS Mojave 10.14.6, Security Update 2019-004 High Sierra,
Security Update 2019-004 Sierra are now available and address the
following:
AppleGraphicsControl
Available for: macOS Mojave 10.14.5
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input
sanitization.
CVE-2019-8693: Arash Tohidi of Solita
autofs
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: Extracting a zip file containing a symbolic link to an
endpoint in an NFS mount that is attacker controlled may bypass
Gatekeeper
Description: This was addressed with additional checks by Gatekeeper
on files mounted through a network share.
CVE-2019-8656: Filippo Cavallarin
Bluetooth
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: A remote attacker may be able to cause arbitrary code
execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2018-19860
Carbon Core
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to cause arbitrary code
execution
Description: A use after free issue was addressed with improved
memory management.
CVE-2019-8661: Natalie Silvanovich of Google Project Zero
Core Data
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to leak memory
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2019-8646: Natalie Silvanovich of Google Project Zero
Core Data
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2019-8660: Samuel Groß and Natalie Silvanovich of Google Project
Zero
Disk Management
Available for: macOS Mojave 10.14.5
Impact: An application may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2019-8697: ccpwd working with Trend Micro’s Zero Day Initiative
FaceTime
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to cause arbitrary code
execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu
Found in Apps
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to leak memory
Description: This issue was addressed with improved checks.
CVE-2019-8663: Natalie Silvanovich of Google Project Zero
Foundation
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: A remote attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2019-8641: Samuel Groß and Natalie Silvanovich of Google Project
Zero
Grapher
Available for: macOS Mojave 10.14.5
Impact: An application may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2019-8695: riusksk of VulWar Corp working with Trend Micro’s Zero
Day Initiative
Graphics Drivers
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.5
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input
sanitization.
CVE-2019-8691: Aleksandr Tarasikov (@astarasikov), Arash Tohidi of
Solita, Lilang Wu and Moony Li of Trend Micro
CVE-2019-8692: Lilang Wu and Moony Li of Trend Micro
Heimdal
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: An issue existed in Samba that may allow attackers to perform
unauthorized actions by intercepting communications between services
Description: This issue was addressed with improved checks to prevent
unauthorized actions.
CVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team
and Catalyst
IOAcceleratorFamily
Available for: macOS Mojave 10.14.5
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2019-8694: Arash Tohidi of Solita
libxslt
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: A remote attacker may be able to view sensitive information
Description: A stack overflow was addressed with improved input
validation.
CVE-2019-13118: found by OSS-Fuzz
Quick Look
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: An attacker may be able to trigger a use-after-free in an
application deserializing an untrusted NSDictionary
Description: This issue was addressed with improved checks.
CVE-2019-8662: Natalie Silvanovich and Samuel Groß of Google Project
Zero
Safari
Available for: macOS Mojave 10.14.5
Impact: Visiting a malicious website may lead to address bar spoofing
Description: An inconsistent user interface issue was addressed with
improved state management.
CVE-2019-8670: Tsubasa FUJII (@reinforchu)
Security
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6
Impact: An application may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2019-8697: ccpwd working with Trend Micro’s Zero Day Initiative
Siri
Available for: macOS Mojave 10.14.5
Impact: A remote attacker may be able to leak memory
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2019-8646: Natalie Silvanovich of Google Project Zero
Time Machine
Available for: macOS Mojave 10.14.5
Impact: The encryption status of a Time Machine backup may be
incorrect
Description: An inconsistent user interface issue was addressed with
improved state management.
CVE-2019-8667: Roland Kletzing of cyber:con GmbH
UIFoundation
Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS
Mojave 10.14.5
Impact: Parsing a maliciously crafted office document may lead to an
unexpected application termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2019-8657: riusksk of VulWar Corp working with Trend Micro’s Zero
Day Initiative
Additional recognition
Classroom
We would like to acknowledge Jeff Johnson of underpassapp.com <http://underpassapp.com/> for
their assistance.
Game Center
We would like to acknowledge Min (Spark) Zheng and Xiaolong Bai of
Alibaba Inc. for their assistance.
Installation note:
macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, and
Security Update 2019-004 Sierra may be obtained from the
Mac App Store or Apple’s Software Downloads web site:
https://support.apple.com/downloads/ <https://support.apple.com/downloads/>
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222 <https://support.apple.com/kb/HT201222>
This message is signed with Apple’s Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/ <https://www.apple.com/support/security/pgp/>
—–BEGIN PGP SIGNATURE—–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=Meho
—–END PGP SIGNATURE—–<html><head><meta http-equiv=”Content-Type” content=”text/html; charset=utf-8″></head><body style=”word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;” class=””>—–BEGIN PGP SIGNED MESSAGE—–<br class=””>Hash: SHA256<br class=””><br class=””>APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update<br class=””>2019-004 High Sierra, Security Update 2019-004 Sierra<br class=””><br class=””>macOS Mojave 10.14.6, Security Update 2019-004 High Sierra,<br class=””>Security Update 2019-004 Sierra are now available and address the<br class=””>following:<br class=””><br class=””>AppleGraphicsControl<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: An application may be able to read restricted memory<br class=””>Description: A validation issue was addressed with improved input<br class=””>sanitization.<br class=””>CVE-2019-8693: Arash Tohidi of Solita<br class=””><br class=””>autofs<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: Extracting a zip file containing a symbolic link to an<br class=””>endpoint in an NFS mount that is attacker controlled may bypass<br class=””>Gatekeeper<br class=””>Description: This was addressed with additional checks by Gatekeeper<br class=””>on files mounted through a network share.<br class=””>CVE-2019-8656: Filippo Cavallarin<br class=””><br class=””>Bluetooth<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause arbitrary code<br class=””>execution<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>input validation.<br class=””>CVE-2018-19860<br class=””><br class=””>Carbon Core<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause arbitrary code<br class=””>execution<br class=””>Description: A use after free issue was addressed with improved<br class=””>memory management.<br class=””>CVE-2019-8661: Natalie Silvanovich of Google Project Zero<br class=””><br class=””>Core Data<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to leak memory<br class=””>Description: An out-of-bounds read was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-8646: Natalie Silvanovich of Google Project Zero<br class=””><br class=””>Core Data<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause unexpected application<br class=””>termination or arbitrary code execution<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>input validation.<br class=””>CVE-2019-8660: Samuel Groß and Natalie Silvanovich of Google Project<br class=””>Zero<br class=””><br class=””>Disk Management<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: An application may be able to execute arbitrary code with<br class=””>system privileges<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>memory handling.<br class=””>CVE-2019-8697: ccpwd working with Trend Micro’s Zero Day Initiative<br class=””><br class=””>FaceTime<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause arbitrary code<br class=””>execution<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>input validation.<br class=””>CVE-2019-8648: Tao Huang and Tielei Wang of Team Pangu<br class=””><br class=””>Found in Apps<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to leak memory<br class=””>Description: This issue was addressed with improved checks.<br class=””>CVE-2019-8663: Natalie Silvanovich of Google Project Zero<br class=””><br class=””>Foundation<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to cause unexpected application<br class=””>termination or arbitrary code execution<br class=””>Description: An out-of-bounds read was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-8641: Samuel Groß and Natalie Silvanovich of Google Project<br class=””>Zero<br class=””><br class=””>Grapher<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: An application may be able to execute arbitrary code with<br class=””>system privileges<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>memory handling.<br class=””>CVE-2019-8695: riusksk of VulWar Corp working with Trend Micro’s Zero<br class=””>Day Initiative<br class=””><br class=””>Graphics Drivers<br class=””>Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.5<br class=””>Impact: An application may be able to read restricted memory<br class=””>Description: A validation issue was addressed with improved input<br class=””>sanitization.<br class=””>CVE-2019-8691: Aleksandr Tarasikov (@astarasikov), Arash Tohidi of<br class=””>Solita, Lilang Wu and Moony Li of Trend Micro<br class=””>CVE-2019-8692: Lilang Wu and Moony Li of Trend Micro<br class=””><br class=””>Heimdal<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: An issue existed in Samba that may allow attackers to perform<br class=””>unauthorized actions by intercepting communications between services<br class=””>Description: This issue was addressed with improved checks to prevent<br class=””>unauthorized actions.<br class=””>CVE-2018-16860: Isaac Boukris and Andrew Bartlett of the Samba Team<br class=””>and Catalyst<br class=””><br class=””>IOAcceleratorFamily<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: An application may be able to execute arbitrary code with<br class=””>kernel privileges<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>memory handling.<br class=””>CVE-2019-8694: Arash Tohidi of Solita<br class=””><br class=””>libxslt<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to view sensitive information<br class=””>Description: A stack overflow was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-13118: found by OSS-Fuzz<br class=””><br class=””>Quick Look<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: An attacker may be able to trigger a use-after-free in an<br class=””>application deserializing an untrusted NSDictionary<br class=””>Description: This issue was addressed with improved checks.<br class=””>CVE-2019-8662: Natalie Silvanovich and Samuel Groß of Google Project<br class=””>Zero<br class=””><br class=””>Safari<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: Visiting a malicious website may lead to address bar spoofing<br class=””>Description: An inconsistent user interface issue was addressed with<br class=””>improved state management.<br class=””>CVE-2019-8670: Tsubasa FUJII (@reinforchu)<br class=””><br class=””>Security<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6<br class=””>Impact: An application may be able to execute arbitrary code with<br class=””>system privileges<br class=””>Description: A memory corruption issue was addressed with improved<br class=””>memory handling.<br class=””>CVE-2019-8697: ccpwd working with Trend Micro’s Zero Day Initiative<br class=””><br class=””>Siri<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: A remote attacker may be able to leak memory<br class=””>Description: An out-of-bounds read was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-8646: Natalie Silvanovich of Google Project Zero<br class=””><br class=””>Time Machine<br class=””>Available for: macOS Mojave 10.14.5<br class=””>Impact: The encryption status of a Time Machine backup may be<br class=””>incorrect<br class=””>Description: An inconsistent user interface issue was addressed with<br class=””>improved state management.<br class=””>CVE-2019-8667: Roland Kletzing of cyber:con GmbH<br class=””><br class=””>UIFoundation<br class=””>Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS<br class=””>Mojave 10.14.5<br class=””>Impact: Parsing a maliciously crafted office document may lead to an<br class=””>unexpected application termination or arbitrary code execution<br class=””>Description: An out-of-bounds read was addressed with improved input<br class=””>validation.<br class=””>CVE-2019-8657: riusksk of VulWar Corp working with Trend Micro’s Zero<br class=””>Day Initiative<br class=””><br class=””>Additional recognition<br class=””><br class=””>Classroom<br class=””>We would like to acknowledge Jeff Johnson of <a href=”http://underpassapp.com” class=””>underpassapp.com</a> for<br class=””>their assistance.<br class=””><br class=””>Game Center<br class=””>We would like to acknowledge Min (Spark) Zheng and Xiaolong Bai of<br class=””>Alibaba Inc. for their assistance.<br class=””><br class=””>Installation note:<br class=””><br class=””>macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, and<br class=””>Security Update 2019-004 Sierra may be obtained from the<br class=””>Mac App Store or Apple’s Software Downloads web site:<br class=””><a href=”https://support.apple.com/downloads/” class=””>https://support.apple.com/downloads/</a><br class=””><br class=””>Information will also be posted to the Apple Security Updates<br class=””>web site: <a href=”https://support.apple.com/kb/HT201222″ class=””>https://support.apple.com/kb/HT201222</a><br class=””><br class=””>This message is signed with Apple’s Product Security PGP key,<br class=””>and details are available at:<br class=””><a href=”https://www.apple.com/support/security/pgp/” class=””>https://www.apple.com/support/security/pgp/</a><br class=””>—–BEGIN PGP SIGNATURE—–<br class=””><br class=””>iQIzBAEBCAAdFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAl01+gkACgkQeC9tht7T<br class=””>K3FK+RAAvFqlMsRnBWbACjgR3mBJb9Q0I/Sszh4a0LEqiiomyvfhgOQIu01UiE1v<br class=””>1P0WOAkAoNUn4sxyWPEKfsi/l8U1JG+NBu+zMVqUnG48wmAkMcBib0/FZwGO1Vo3<br class=””>czV8x8c4lupiIaksGeWxJQ9VKE7BaFttrCQrbEbg2sh5IHRRcyjzao2qGTItw5Xp<br class=””>EKGccuSbBV8njb38L0ITiByMAOxRU9IYHGK0gV7zT9VmWp7sHSFn1aoLehnH7aCq<br class=””>fohWNFRGjb6BtkSnqQvDidaLEcCCgvelUd+EhwpSm+L4lsmTM/+Ae8TE5G/2Fx+s<br class=””>3wWCfBCx7Y10HRkSv+4fnuJb+aisGxD5q3gbcqJINLx39Jc4oaMyY+xuM30uXn+C<br class=””>vs8Sd705rcNGIKPb0tkEnoXwuptCmp+YqBMjE/MhmYdxGWhxzd3CW9g453yz3WOg<br class=””>2rpM0Emh6+BIgyBP9tJ08FZL46paKZeGq3VmFz8DRP+POQsnpVMV+LCQm6kfhOEo<br class=””>Id0y+zmfhs6BqlrmbC7djnx5ptLJsEIvgNIyHj9oBoZOXt6RFRBzfEkie4ToylhA<br class=””>wjlZxngc6OOtgrQHiSFRC3qaSm2Eb2bCA/8yTkKkqsxsqQYFXgXhuzAGoXBBRNRZ<br class=””>uUGtetOl6R3STIMg8pgof/c+QpFkHeHPgKf5+J71J5vCu1aPF34=<br class=””>=Meho<br class=””>—–END PGP SIGNATURE—–</body></html> _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce@lists.apple.com)
Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/security-announce/advinp%40cert.hr
This email sent to advinp@cert.hr
$downloadlink = get_field('download_link'); ?>