| Vulnerability Name: | CVE-2019-6209 (CCN-156045) | ||||||||||||
| Assigned: | 2019-01-22 | ||||||||||||
| Published: | 2019-01-22 | ||||||||||||
| Updated: | 2019-03-06 | ||||||||||||
| Summary: | An out-of-bounds read issue existed that led to the disclosure of kernel memory. This was addressed with improved input validation. This issue is fixed in iOS 12.1.3, macOS Mojave 10.14.3, tvOS 12.1.2, watchOS 5.1.3. A malicious application may be able to determine kernel memory layout. | ||||||||||||
| CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) 5.0 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C)
5.0 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-125 | ||||||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2019-6209 Source: BID Type: Third Party Advisory 106739 Source: XF Type: UNKNOWN apple-macos-cve20196209-info-disc(156045) Source: CCN Type: Packet Storm Security [01-29-2019] iOS / macOS Uninitialized Kernel Stack Disclosure Source: CCN Type: Apple security document HT209443 About the security content of iOS 12.1.3 Source: CCN Type: Apple security document HT209446 About the security content of macOS Mojave 10.14.3, Security Update 2019-001 High Sierra, Security Update 2019-001 Sierra Source: CCN Type: Apple security document HT209447 About the security content of tvOS 12.1.2 Source: CCN Type: Apple security document HT209448 About the security content of watchOS 5.1.3 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT209443 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT209446 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT209447 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT209448 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [01-30-2019] Source: EXPLOIT-DB Type: Exploit, Third Party Advisory 46285 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||