An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 14.2 and iPadOS 14.2, macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/Dec/32 | Mailing List Third Party Advisory |
https://support.apple.com/en-us/HT211849 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT211929 | Release Notes Vendor Advisory |
https://support.apple.com/kb/HT211930 | Vendor Advisory |
https://support.apple.com/kb/HT211931 | Vendor Advisory |
http://seclists.org/fulldisclosure/2020/Dec/32 | Mailing List Third Party Advisory |
https://support.apple.com/en-us/HT211849 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT211929 | Release Notes Vendor Advisory |
https://support.apple.com/kb/HT211930 | Vendor Advisory |
https://support.apple.com/kb/HT211931 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2020/Dec/32 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/en-us/HT211849 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT211929 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/kb/HT211930 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT211931 - Vendor Advisory |
14 Oct 2022, 02:23
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:11.0.1:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:* |
|
References | (CONFIRM) https://support.apple.com/kb/HT211930 - Vendor Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2020/Dec/32 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT211931 - Vendor Advisory |
Information
Published : 2020-12-08 20:15
Updated : 2024-11-21 04:54
NVD link : CVE-2020-10011
Mitre link : CVE-2020-10011
CVE.ORG link : CVE-2020-10011
JSON object : View
Products Affected
apple
- ipados
- tvos
- iphone_os
- mac_os_x
CWE
CWE-125
Out-of-bounds Read