Description
Multiple vulnerabilities were found in iCloud. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
- An out-of-bounds read vulnerability in WebKit can be exploited remotely to obtain sensitive information;
- Multiple memory corruption vulnerabilities in WebKit can be exploited remotely to execute arbitrary code;
- An input validation issue in SQLite can be exploited remotely to gain privileges;
- A memory corruption vulnerability in SQLite can be exploited to execute arbitrary code;
- An input validation issue in SQLite can be exploited remotely to obtain sensitive information;
- A memory corruption vulnerability in SQLite can be exploited to gain privileges;
- An out-of-bounds read vulnerability in CoreText can be exploited remotely to obtain sensitive information;
Original advisories
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2019-8601 high
- CVE-2019-8628 high
- CVE-2019-8597 warning
- CVE-2019-8610 high
- CVE-2019-8622 high
- CVE-2019-8607 warning
- CVE-2019-8571 high
- CVE-2019-8586 high
- CVE-2019-8583 high
- CVE-2019-8611 high
- CVE-2019-8615 warning
- CVE-2019-8594 high
- CVE-2019-8595 high
- CVE-2019-8584 high
- CVE-2019-6237 high
- CVE-2019-8577 high
- CVE-2019-8600 critical
- CVE-2019-8623 high
- CVE-2019-8598 warning
- CVE-2019-8608 high
- CVE-2019-8619 high
- CVE-2019-8602 high
- CVE-2019-8587 high
- CVE-2019-8596 high
- CVE-2019-8609 high
- CVE-2019-8582 warning
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!