APPLE-SA-2019-10-07-3 iCloud for Windows 10.7

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2019-10-07-3 iCloud for Windows 10.7

iCloud for Windows 10.7 is now available and addresses the following:

UIFoundation
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing a maliciously crafted text file may lead to
arbitrary code execution
Description: A buffer overflow was addressed with improved bounds
checking.
CVE-2019-8745: riusksk of VulWar Corp working with Trend Micro's Zero
Day Initiative

WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting
Description: A logic issue was addressed with improved state
management.
CVE-2019-8625: Sergei Glazunov of Google Project Zero
CVE-2019-8719: Sergei Glazunov of Google Project Zero

WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed with
improved memory handling.
CVE-2019-8707: an anonymous researcher working with Trend Micro's
Zero Day Initiative, cc working with Trend Micro Zero Day Initiative
CVE-2019-8726: Jihui Lu of Tencent KeenLab
CVE-2019-8733: Sergei Glazunov of Google Project Zero
CVE-2019-8735: G. Geshev working with Trend Micro Zero Day Initiative
CVE-2019-8763: Sergei Glazunov of Google Project Zero

Additional recognition

Software Update
We would like to acknowledge Michael Gorelik (@smgoreli) of Morphisec
(morphisec.com) for their assistance.

WebKit
We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) and
Zhihua Yao of DBAPPSecurity Zion Lab for their assistance.

Installation note:

iCloud for Windows 10.7 may be obtained from:
https://support.apple.com/HT204283

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
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=j7PO
-----END PGP SIGNATURE-----



[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux