René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

170 lines
5.2 KiB
JSON

{
"id": "CVE-2019-8542",
"sourceIdentifier": "product-security@apple.com",
"published": "2019-12-18T18:15:24.990",
"lastModified": "2019-12-30T18:55:41.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. A malicious application may be able to elevate privileges."
},
{
"lang": "es",
"value": "Un desbordamiento del b\u00fafer fue abordado mejorando la comprobaci\u00f3n de l\u00edmites. Este problema es corregido en iOS versi\u00f3n 12.2, macOS Mojave versi\u00f3n 10.14.4, tvOS versi\u00f3n 12.2, watchOS versi\u00f3n 5.2, iTunes versi\u00f3n 12.9.4 para Windows, iCloud para Windows versi\u00f3n 7.11. Una aplicaci\u00f3n maliciosa puede ser capaz de elevar privilegios."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "7.11",
"matchCriteriaId": "0B7B3A93-FF67-4AA7-8177-3A2F43BA63BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "12.9.4",
"matchCriteriaId": "A87496C6-1F96-4A50-855B-A9DCC6EA9DFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.2",
"matchCriteriaId": "1531E802-5419-4B38-8C0C-BDCBC272648F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.14.4",
"matchCriteriaId": "09CDBB72-2A0D-4321-BA1F-4FB326A5646A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.2",
"matchCriteriaId": "98912716-69F2-4372-98F0-BD6CCA9AAEB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.2",
"matchCriteriaId": "8962A4FE-AE67-421E-9635-B03E2EBCDF19"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/HT209599",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT209600",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT209601",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT209602",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT209604",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT209605",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}