Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4011 Multiple vulnerabilities have been identified in tvOS 30 October 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Apple TV Publisher: Apple Operating System: Apple iOS Impact/Access: Root Compromise -- Existing Account Execute Arbitrary Code/Commands -- Remote with User Interaction Increased Privileges -- Existing Account Access Privileged Data -- Existing Account Cross-site Scripting -- Remote with User Interaction Access Confidential Data -- Remote/Unauthenticated Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-8823 CVE-2019-8822 CVE-2019-8821 CVE-2019-8820 CVE-2019-8819 CVE-2019-8816 CVE-2019-8815 CVE-2019-8814 CVE-2019-8813 CVE-2019-8812 CVE-2019-8811 CVE-2019-8808 CVE-2019-8803 CVE-2019-8798 CVE-2019-8797 CVE-2019-8795 CVE-2019-8794 CVE-2019-8787 CVE-2019-8786 CVE-2019-8785 CVE-2019-8783 CVE-2019-8782 Reference: ESB-2019.4010 ESB-2019.4009 Original Bulletin: https://support.apple.com/en-au/HT201222 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2019-10-29-3 tvOS 13.2 tvOS 13.2 is now available and addresses the following: Accounts Available for: Apple TV 4K and Apple TV HD Impact: A remote attacker may be able to leak memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2019-8787: Steffen Klee of Secure Mobile Networking Lab at Technische Universität Darmstadt App Store Available for: Apple TV 4K and Apple TV HD Impact: A local attacker may be able to login to the account of a previously logged in user without valid credentials. Description: An authentication issue was addressed with improved state management. CVE-2019-8803: Kiyeon An, 차민ê·\x{156} (CHA Minkyu) Audio Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8785: Ian Beer of Google Project Zero CVE-2019-8797: 08Tc3wBB working with SSD Secure Disclosure AVEVideoEncoder Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8795: 08Tc3wBB working with SSD Secure Disclosure File System Events Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8798: ABC Research s.r.o. working with Trend Micro's Zero Day Initiative Kernel Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2019-8794: 08Tc3wBB working with SSD Secure Disclosure Kernel Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8786: an anonymous researcher WebKit Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved state management. CVE-2019-8813: an anonymous researcher WebKit Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2019-8782: Cheolung Lee of LINE+ Security Team CVE-2019-8783: Cheolung Lee of LINE+ Graylab Security Team CVE-2019-8808: found by OSS-Fuzz CVE-2019-8811: Soyeon Park of SSLab at Georgia Tech CVE-2019-8812: an anonymous researcher CVE-2019-8814: Cheolung Lee of LINE+ Security Team CVE-2019-8816: Soyeon Park of SSLab at Georgia Tech CVE-2019-8819: Cheolung Lee of LINE+ Security Team CVE-2019-8820: Samuel GroÃ\x{159} of Google Project Zero CVE-2019-8821: Sergei Glazunov of Google Project Zero CVE-2019-8822: Sergei Glazunov of Google Project Zero CVE-2019-8823: Sergei Glazunov of Google Project Zero WebKit Process Model Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2019-8815: Apple Additional recognition CFNetwork We would like to acknowledge Lily Chen of Google for their assistance. Kernel We would like to acknowledge Jann Horn of Google Project Zero for their assistance. WebKit We would like to acknowledge Dlive of Tencent's Xuanwu Lab and Zhiyi Zhang of Codesafe Team of Legendsec at Qi'anxin Group for their assistance. Installation note: Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> System -> Software Update -> Update Software." To check the current version of software, select "Settings -> General -> About." Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ - -----BEGIN PGP SIGNATURE----- iQJdBAEBCABHFiEEM5FaaFRjww9EJgvRBz4uGe3y0M0FAl24p5UpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQBz4uGe3y0M2DIQ/9 FQmnN+1/tdXaFFI1PtdJ9hgXONcdsi+D05mREDTX7v0VaLzChX/N3DccI00Z1uT5 VNKHRjInGYDZoO/UntzAWoZa+tcueaY23XhN9xTYrUlt1Ol1gIsaxTEgPtax4B9A PoqWb6S+oK1SHUxglGnlLtXkcyt3WHJ5iqan7BM9XX6dsriwgoBgKADpFi3FCXoa cFIvpoM6ZhxYyMPpxmMc1IRwgjDwOn2miyjkSaAONXw5R5YGRxSsjq+HkzYE3w1m m2NZElUB1nRmlyuU3aMsHUTxwAnfzryPiHRGUTcNZao39YBsyWz56sr3++g7qmnD uZZzBnISQpC6oJCWclw3UHcKHH+V0+1q059GHBoku6Xmkc5bPRnKdFgSf5OvyQUw XGjwL5UbGB5eTtdj/Kx5Rd/m5fFIUxVu7HB3bGQGhYHIc9iTdi9j3mCd3nOHCIEj Re07c084jl2Git4sH2Tva7tOqFyI2IyNVJ0LjBXO54fAC2mtFz3mkDFxCEzL5V92 O/Wct2T6OpYghzkrOOlUEAQJTbwJjTZBWsUubcOoJo6P9JUPBDJKB0ibAaCWrt9I 8OU5wRr3q0fTA3N/qdGGbQ/tgUwiMHGuqrHMv0XYGPfO5Qg5GuHpTYchZrP5nFwf ziQuQtO92b1FA4sDI+ue1sDIG84tPrkTAeLmveBjezc= =KsmX - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXbjzuWaOgq3Tt24GAQjG1A/+MV/InlmRKJDwIr1oIXs6j7G8pNHV4GF6 D/7BRl7PlaI2+ZLh+HlkrFPnsisMvdbPIzuqk61ssHnzTg/RwW1B5RF3uA30laOF KTsxZheTLSVd1gC81dBwUrQMRUx1+Js6A2ZRWPIqLuT5hYDCJqqvF5D47RpYf+7z J+cn20Kp7OyOJ0CLRU1Q7wfVTNIhqHLHzVZtU1A25x4RFifgYBGK/Yp04wHX3PT9 eSNg6VAZNEIyDpyu59Qe4qaUW/NRCfzlH2v7PtSxV8lwCgP5gCLmZkaff/2m2FuR NRhjkAPbBK/xipmOWMxK3VTChKVM3ScGBdrMixhuyz21DMvuQqCLvC8sF3CM78dw pgPj5LFUgk6gFAj0pxmLZwhwDGNE/i7LwehD7CQlg/CPS5Uv0BaRQY0qh2JxULul vbCasiBv9CwlUK40bCkxhE0Pc/6EGJ+rI9eBrHABSd7ECUnPiyd1nLGpeIPefYB3 jW58sA+FcDiXuz6V5FfDtBqaaFw7xk1tmokW42pGQMuM/bD/zL4as/qSkl8WmqRP VBCcEXc6Kpnida2PxcqfvE47ToNzesbR3pclCrAl6ThtpUkTFp3VWTle4bKkXP8/ gczU9owvP4WaaWNZ9WVYv4qDvWPROE3fDjULbAqwtH3goG5k+4QTn6pts+mLnpkO DCgytUKWl3U= =glWO -----END PGP SIGNATURE-----