CVE-2020-9983

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:icloud:11.5:*:*:*:*:windows:*:*
cpe:2.3:a:apple:itunes:12.10.9:*:*:*:*:windows:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:14.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:7.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

History

24 May 2022, 18:48

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:12.10.9:*:*:*:*:windows:*:*
cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:icloud:11.5:*:*:*:*:windows:*:*
cpe:2.3:o:apple:tvos:14.0:*:*:*:*:*:*:*
References (DEBIAN) https://www.debian.org/security/2020/dsa-4797 - (DEBIAN) https://www.debian.org/security/2020/dsa-4797 - Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/22 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/22 - Mailing List, Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT211952 - (CONFIRM) https://support.apple.com/kb/HT211952 - Vendor Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/19 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/19 - Mailing List, Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2020/11/23/3 - (MLIST) http://www.openwall.com/lists/oss-security/2020/11/23/3 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/20 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/20 - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDGBNKYT7NMW7CJ26YFUPUHPJVYGV7IQ/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDGBNKYT7NMW7CJ26YFUPUHPJVYGV7IQ/ - Mailing List, Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT211850 - (CONFIRM) https://support.apple.com/kb/HT211850 - Vendor Advisory
References (CONFIRM) https://support.apple.com/kb/HT211843 - (CONFIRM) https://support.apple.com/kb/HT211843 - Vendor Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/18 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/18 - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202012-10 - (GENTOO) https://security.gentoo.org/glsa/202012-10 - Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT211844 - (CONFIRM) https://support.apple.com/kb/HT211844 - Vendor Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BY2OBQZFMEFZOSWXPXHPEHOJXXILEEX2/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BY2OBQZFMEFZOSWXPXHPEHOJXXILEEX2/ - Mailing List, Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT211935 - (CONFIRM) https://support.apple.com/kb/HT211935 - Vendor Advisory

Information

Published : 2020-10-16 17:15

Updated : 2024-02-04 21:23


NVD link : CVE-2020-9983

Mitre link : CVE-2020-9983

CVE.ORG link : CVE-2020-9983


JSON object : View

Products Affected

apple

  • iphone_os
  • safari
  • ipados
  • itunes
  • watchos
  • tvos
  • icloud

fedoraproject

  • fedora
CWE
CWE-787

Out-of-bounds Write