A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2020/Nov/18 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Nov/19 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Nov/20 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Nov/22 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2020/11/23/3 | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202012-10 | Third Party Advisory |
https://support.apple.com/HT211845 | Release Notes Vendor Advisory |
https://support.apple.com/kb/HT211843 | Vendor Advisory |
https://support.apple.com/kb/HT211844 | Vendor Advisory |
https://support.apple.com/kb/HT211850 | Vendor Advisory |
https://support.apple.com/kb/HT211935 | Vendor Advisory |
https://support.apple.com/kb/HT211952 | Vendor Advisory |
https://www.debian.org/security/2020/dsa-4797 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
23 Jul 2022, 10:14
Type | Values Removed | Values Added |
---|---|---|
References | (MLIST) http://www.openwall.com/lists/oss-security/2020/11/23/3 - Mailing List, Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/20 - Mailing List, Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/18 - Mailing List, Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/19 - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4797 - Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT211844 - Vendor Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202012-10 - Third Party Advisory | |
References | (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/22 - Mailing List, Third Party Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT211935 - Vendor Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT211843 - Vendor Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT211850 - Vendor Advisory | |
References | (CONFIRM) https://support.apple.com/kb/HT211952 - Vendor Advisory | |
CPE | cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* cpe:2.3:a:webkit:webkitgtk\+:*:*:*:*:*:*:*:* cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* |
Information
Published : 2020-10-16 17:15
Updated : 2024-02-04 21:23
NVD link : CVE-2020-9951
Mitre link : CVE-2020-9951
CVE.ORG link : CVE-2020-9951
JSON object : View
Products Affected
apple
- iphone_os
- safari
- ipados
- itunes
- watchos
- tvos
- icloud
webkit
- webkitgtk\+
debian
- debian_linux
CWE
CWE-416
Use After Free