René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

136 lines
3.9 KiB
JSON

{
"id": "CVE-2019-7286",
"sourceIdentifier": "product-security@apple.com",
"published": "2019-12-18T18:15:22.067",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2022-05-23",
"cisaActionDue": "2022-06-13",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple Multiple Products Memory Corruption Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 12.1.4, macOS Mojave 10.14.3 Supplemental Update. An application may be able to gain elevated privileges."
},
{
"lang": "es",
"value": "Un problema de corrupci\u00f3n de memoria fue abordado mejorando la comprobaci\u00f3n de entrada. Este problema fue abordado en iOS versi\u00f3n 12.1.4, Actualizaci\u00f3n Complementaria macOS Mojave versi\u00f3n 10.14.3. Una aplicaci\u00f3n puede obtener privilegios elevados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.1.4",
"matchCriteriaId": "EFE9E51E-D927-4F8A-9290-DE9E7786C423"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.14.3",
"matchCriteriaId": "5EC331DC-EE67-426B-8C75-1E0E070901B8"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/HT209520",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT209521",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT209601",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/HT209602",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}