Vulnerabilities > CVE-2019-8705 - Out-of-bounds Write vulnerability in Apple Tvos
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
A memory corruption issue was addressed with improved validation. This issue is fixed in macOS Catalina 10.15, tvOS 13. Processing a maliciously crafted movie may result in the disclosure of process memory.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family MacOS X Local Security Checks NASL id MACOS_HT210634.NASL description The remote host is running a version of macOS / Mac OS X that is prior to 10.15. It is, therefore, affected by multiple vulnerabilities. - An application may be able to execute arbitrary code with kernel privileges (CVE-2019-8748) - Multiple issues in PHP (CVE-2019-11041, CVE-2019-11042) - Processing a maliciously crafted movie may result in the disclosure of process memory (CVE-2019-8705) - The last seen 2020-06-01 modified 2020-06-02 plugin id 130057 published 2019-10-18 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130057 title macOS < 10.15 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include('compat.inc'); if (description) { script_id(130057); script_version("1.7"); script_cvs_date("Date: 2020/01/07"); script_cve_id( "CVE-2019-8701", "CVE-2019-8705", "CVE-2019-8717", "CVE-2019-8730", "CVE-2019-8745", "CVE-2019-8748", "CVE-2019-8755", "CVE-2019-8757", "CVE-2019-8758", "CVE-2019-8768", "CVE-2019-8769", "CVE-2019-8770", "CVE-2019-8772", "CVE-2019-8781", "CVE-2019-11041", "CVE-2019-11042" ); script_xref(name:"APPLE-SA", value:"HT210634"); script_name(english:"macOS < 10.15 Multiple Vulnerabilities"); script_summary(english:"Checks the version of macOS."); script_set_attribute(attribute:"synopsis", value: "The remote host is missing a macOS update that fixes multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The remote host is running a version of macOS / Mac OS X that is prior to 10.15. It is, therefore, affected by multiple vulnerabilities. - An application may be able to execute arbitrary code with kernel privileges (CVE-2019-8748) - Multiple issues in PHP (CVE-2019-11041, CVE-2019-11042) - Processing a maliciously crafted movie may result in the disclosure of process memory (CVE-2019-8705) - The 'Share Mac Analytics' setting may not be disabled when a user deselects the switch to share analytics (CVE-2019-8757) - An application may be able to execute arbitrary code with system privileges (CVE-2019-8758) - A malicious application may be able to determine kernel memory layout (CVE-2019-8755) - An application may be able to execute arbitrary code with kernel privileges (CVE-2019-8717) - An application may be able to execute arbitrary code with kernel privileges (CVE-2019-8781) - A local user may be able to view a user's locked notes (CVE-2019-8730) - An attacker may be able to exfiltrate the contents of an encrypted PDF (CVE-2019-8772) - A malicious application may be able to access recent documents (CVE-2019-8770) - An application may be able to execute arbitrary code with system privileges (CVE-2019-8701) - Processing a maliciously crafted text file may lead to arbitrary code execution (CVE-2019-8745) - Visiting a maliciously crafted website may reveal browsing history (CVE-2019-8769) - A user may be unable to delete browsing history items (CVE-2019-8768) Note that Nessus has not tested for this issue but has instead relied only on the operating system's self-reported version number."); script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT210634"); script_set_attribute(attribute:"solution", value: "Upgrade to macOS 10.15 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-8781"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/10/07"); script_set_attribute(attribute:"patch_publication_date", value:"2019/10/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/18"); script_set_attribute(attribute:"potential_vulnerability", value:"true"); script_set_attribute(attribute:"plugin_type", value:"combined"); script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x"); script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:macos"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_get_info.nasl", "os_fingerprint.nasl"); script_require_keys("Settings/ParanoidReport"); script_require_ports("Host/MacOSX/Version", "Host/OS"); exit(0); } include('lists.inc'); include('vcf.inc'); include('vcf_extras_apple.inc'); app_info = vcf::apple::macos::get_app_info(); if (report_paranoia < 2) audit(AUDIT_PARANOID); # Build numbers from: # https://en.wikipedia.org/wiki/MacOS#Release_history -> # https://en.wikipedia.org/wiki/MacOS_Sierra # https://en.wikipedia.org/wiki/MacOS_High_Sierra # https://en.wikipedia.org/wiki/MacOS_Mojave # https://en.wikipedia.org/wiki/MacOS_Catalina constraints = [ { 'min_version': '10.12', 'max_version': '10.15.0', 'fixed_build': '19A583', 'fixed_display': '10.15 Build 19A583' } ]; vcf::apple::macos::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
NASL family MacOS X Local Security Checks NASL id MACOS_HT210722.NASL description The remote host is running a version of macOS or Mac OS X that is 10.15.x prior to 10.15.1, 10.14.x prior to 10.14.6 security update 2019-001, 10.13.x prior to 10.13.6 security update 2019-006. It is, therefore, affected by multiple vulnerabilities : - An out-of-bounds read error exists in the accounts component due to improper input validation. A remote attacker can exploit this, to disclose memory contents. (CVE-2019-8787) - A security bypass vulnerability exists in the App Store component due to an improper state management implementation. A local attacker can exploit this, to login to the account of a previously logged in user without valid credentials. (CVE-2019-8803) - An out-of-bounds read error exists in the IOGraphics component due to improper bounds checking. A local attacker can exploit this, to cause unexpected system termination or to read kernel memory. (CVE-2019-8759) Note that Nessus has not tested for this issue but has instead relied only on the operating system last seen 2020-03-18 modified 2019-11-13 plugin id 130967 published 2019-11-13 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130967 title macOS 10.15.x < 10.15.1 / 10.14.x < 10.14.6 Security Update 2019-001 / 10.13.x < 10.13.6 Security Update 2019-006 code # # (C) Tenable Network Security, Inc. # include('compat.inc'); if (description) { script_id(130967); script_version("1.7"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/03/10"); script_cve_id( "CVE-2017-7152", "CVE-2018-12152", "CVE-2018-12153", "CVE-2018-12154", "CVE-2019-8509", "CVE-2019-8592", "CVE-2019-8705", "CVE-2019-8706", "CVE-2019-8708", "CVE-2019-8709", "CVE-2019-8715", "CVE-2019-8716", "CVE-2019-8717", "CVE-2019-8736", "CVE-2019-8737", "CVE-2019-8744", "CVE-2019-8745", "CVE-2019-8746", "CVE-2019-8748", "CVE-2019-8749", "CVE-2019-8750", "CVE-2019-8754", "CVE-2019-8756", "CVE-2019-8759", "CVE-2019-8761", "CVE-2019-8767", "CVE-2019-8772", "CVE-2019-8784", "CVE-2019-8785", "CVE-2019-8786", "CVE-2019-8787", "CVE-2019-8788", "CVE-2019-8789", "CVE-2019-8794", "CVE-2019-8797", "CVE-2019-8798", "CVE-2019-8801", "CVE-2019-8802", "CVE-2019-8803", "CVE-2019-8805", "CVE-2019-8807", "CVE-2019-8817", "CVE-2019-8824", "CVE-2019-8825", "CVE-2019-8829", "CVE-2019-8831", "CVE-2019-8850", "CVE-2019-8858", "CVE-2019-11041", "CVE-2019-11042", "CVE-2019-15126" ); script_bugtraq_id(103136, 105582); script_xref(name:"APPLE-SA", value:"HT210722"); script_xref(name:"APPLE-SA", value:"APPLE-SA-2019-10-29"); script_name(english:"macOS 10.15.x < 10.15.1 / 10.14.x < 10.14.6 Security Update 2019-001 / 10.13.x < 10.13.6 Security Update 2019-006"); script_summary(english:"Checks the version of macOS or Mac OS X."); script_set_attribute(attribute:"synopsis", value: "The remote host is missing a macOS or Mac OS X security update that fixes multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The remote host is running a version of macOS or Mac OS X that is 10.15.x prior to 10.15.1, 10.14.x prior to 10.14.6 security update 2019-001, 10.13.x prior to 10.13.6 security update 2019-006. It is, therefore, affected by multiple vulnerabilities : - An out-of-bounds read error exists in the accounts component due to improper input validation. A remote attacker can exploit this, to disclose memory contents. (CVE-2019-8787) - A security bypass vulnerability exists in the App Store component due to an improper state management implementation. A local attacker can exploit this, to login to the account of a previously logged in user without valid credentials. (CVE-2019-8803) - An out-of-bounds read error exists in the IOGraphics component due to improper bounds checking. A local attacker can exploit this, to cause unexpected system termination or to read kernel memory. (CVE-2019-8759) Note that Nessus has not tested for this issue but has instead relied only on the operating system's self-reported version number."); # https://support.apple.com/en-us/HT210722 script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?39d6c45e"); script_set_attribute(attribute:"solution", value: "Upgrade to macOS 10.15.1 / 10.14.6 security update 2019-001 / 10.13.6 security update 2019-006 or later"); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-8807"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/10/29"); script_set_attribute(attribute:"patch_publication_date", value:"2019/10/29"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/11/13"); script_set_attribute(attribute:"plugin_type", value:"combined"); script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:mac_os_x"); script_set_attribute(attribute:"cpe", value:"cpe:/o:apple:macos"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"MacOS X Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_get_info.nasl", "os_fingerprint.nasl"); script_require_ports("Host/MacOSX/Version", "Host/OS"); exit(0); } include('lists.inc'); include('vcf.inc'); include('vcf_extras_apple.inc'); app_info = vcf::apple::macos::get_app_info(); constraints = [ { 'min_version': '10.13', 'max_version': '10.13.6', 'fixed_build': '17G9016', 'fixed_display': '10.13.6 Security Update 2019-006' }, { 'min_version': '10.14', 'max_version': '10.14.6', 'fixed_build': '18G1012', 'fixed_display': '10.14.6 Security Update 2019-001' }, { 'min_version': '10.15', 'fixed_version': '10.15.1' } ]; vcf::apple::macos::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);