2019-02-18 09:04:38 -05:00
{
2020-10-27 20:01:43 +00:00
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
2019-03-18 03:08:23 +00:00
"CVE_data_meta" : {
"ID" : "CVE-2019-8834" ,
2020-10-27 20:01:43 +00:00
"ASSIGNER" : "product-security@apple.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Apple" ,
"product" : {
"product_data" : [
{
"product_name" : "iOS and iPadOS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_value" : "13.3"
}
]
}
} ,
{
"product_name" : "macOS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_value" : "10.15"
}
]
}
} ,
{
"product_name" : "macOS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_value" : "6.1"
}
]
}
} ,
{
"product_name" : "macOS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_value" : "13.3"
}
]
}
} ,
{
"product_name" : "macOS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_value" : "12.10"
}
]
}
} ,
{
"product_name" : "macOS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_value" : "10.9"
}
]
}
} ,
{
"product_name" : "macOS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_value" : "7.16"
}
]
}
}
]
}
}
]
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "An attacker in a privileged network position may be able to bypass HSTS for a limited number of specific top-level domains previously not in the HSTS preload list"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "MISC" ,
"url" : "https://support.apple.com/en-us/HT210785" ,
"name" : "https://support.apple.com/en-us/HT210785"
} ,
{
"refsource" : "MISC" ,
"url" : "https://support.apple.com/en-us/HT210788" ,
"name" : "https://support.apple.com/en-us/HT210788"
} ,
{
"refsource" : "MISC" ,
"url" : "https://support.apple.com/en-us/HT210789" ,
"name" : "https://support.apple.com/en-us/HT210789"
} ,
{
"refsource" : "MISC" ,
"url" : "https://support.apple.com/en-us/HT210790" ,
"name" : "https://support.apple.com/en-us/HT210790"
} ,
{
"refsource" : "MISC" ,
"url" : "https://support.apple.com/en-us/HT210793" ,
"name" : "https://support.apple.com/en-us/HT210793"
} ,
{
"refsource" : "MISC" ,
"url" : "https://support.apple.com/en-us/HT210794" ,
"name" : "https://support.apple.com/en-us/HT210794"
} ,
{
"refsource" : "MISC" ,
"url" : "https://support.apple.com/en-us/HT210795" ,
"name" : "https://support.apple.com/en-us/HT210795"
}
]
2019-03-18 03:08:23 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-10-27 20:01:43 +00:00
"value" : "A configuration issue was addressed with additional restrictions. This issue is fixed in tvOS 13.3, watchOS 6.1.1, iCloud for Windows 10.9, macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra, iOS 13.3 and iPadOS 13.3, iTunes 12.10.3 for Windows, iCloud for Windows 7.16. An attacker in a privileged network position may be able to bypass HSTS for a limited number of specific top-level domains previously not in the HSTS preload list."
2019-03-18 03:08:23 +00:00
}
]
}
}