A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2020/Dec/32 - Mailing List, Third Party Advisory | |
References | () https://support.apple.com/kb/HT211288 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT211289 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT211290 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT211291 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT211293 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT211294 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT211295 - Vendor Advisory | |
References | () https://support.apple.com/kb/HT211931 - Vendor Advisory | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-20-1389/ - Third Party Advisory, VDB Entry |
03 Sep 2022, 03:58
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:* cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:* cpe:2.3:o:apple:macos:11.0.1:*:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:* |
|
References | (FULLDISC) http://seclists.org/fulldisclosure/2020/Dec/32 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT211931 - Vendor Advisory | |
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-20-1389/ - Third Party Advisory, VDB Entry |
Information
Published : 2020-10-22 18:15
Updated : 2024-11-21 05:41
NVD link : CVE-2020-9883
Mitre link : CVE-2020-9883
CVE.ORG link : CVE-2020-9883
JSON object : View
Products Affected
apple
- iphone_os
- watchos
- mac_os_x
- tvos
- macos
- ipados
- icloud
- itunes
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')