Operating System:

[Mac]

Published:

27 September 2019

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.3647
                                Xcode 11.0
                             27 September 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Xcode
Publisher:         Apple
Operating System:  Mac OS
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-8739 CVE-2019-8738 CVE-2019-8724
                   CVE-2019-8723 CVE-2019-8722 CVE-2019-8721
                   CVE-2019-3855  

Reference:         ESB-2019.2638
                   ESB-2019.0894

Original Bulletin: 
   https://support.apple.com/en-au/HT210609

- --------------------------BEGIN INCLUDED TEXT--------------------

APPLE-SA-2019-9-26-7 Xcode 11.0

Xcode 11.0 addresses the following:

IDE SCM
Available for: macOS Mojave 10.14.4 and later
Impact: Multiple issues in libssh2
Description: Multiple issues were addressed by updating to version
2.16.
CVE-2019-3855: Chris Coulson

ld64
Available for: macOS Mojave 10.14.4 and later
Impact: Compiling code without proper input validation could lead to
arbitrary code execution with user privilege
Description: Multiple issues in ld64 in the Xcode toolchains were
addressed by updating to version ld64-507.4.
CVE-2019-8721: Pan ZhenPeng of Qihoo 360 Nirvan Team
CVE-2019-8722: Pan ZhenPeng of Qihoo 360 Nirvan Team
CVE-2019-8723: Pan ZhenPeng of Qihoo 360 Nirvan Team
CVE-2019-8724: Pan ZhenPeng of Qihoo 360 Nirvan Team

otool
Available for: macOS Mojave 10.14.4 and later
Impact: Processing a maliciously crafted file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed with improved
state management.
CVE-2019-8738: Pan ZhenPeng (@Peterpan0927) of Qihoo 360 Nirvan Team
CVE-2019-8739: Pan ZhenPeng (@Peterpan0927) of Qihoo 360 Nirvan Team

Installation note:

Xcode 11.0 may be obtained from:

https://developer.apple.com/xcode/downloads/

To check that the Xcode has been updated:

* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "11.0".

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=yB/F
-----END PGP SIGNATURE-----