CVE-2020-9876

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.
References
Link Resource
http://seclists.org/fulldisclosure/2020/Dec/32 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/22 Mailing List Third Party Advisory
https://support.apple.com/kb/HT211288 Vendor Advisory
https://support.apple.com/kb/HT211289 Vendor Advisory
https://support.apple.com/kb/HT211290 Vendor Advisory
https://support.apple.com/kb/HT211291 Vendor Advisory
https://support.apple.com/kb/HT211293 Vendor Advisory
https://support.apple.com/kb/HT211294 Vendor Advisory
https://support.apple.com/kb/HT211295 Vendor Advisory
https://support.apple.com/kb/HT211843 Vendor Advisory
https://support.apple.com/kb/HT211844 Vendor Advisory
https://support.apple.com/kb/HT211850 Vendor Advisory
https://support.apple.com/kb/HT211931 Vendor Advisory
https://support.apple.com/kb/HT211935 Vendor Advisory
https://support.apple.com/kb/HT211952 Vendor Advisory
http://seclists.org/fulldisclosure/2020/Dec/32 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/22 Mailing List Third Party Advisory
https://support.apple.com/kb/HT211288 Vendor Advisory
https://support.apple.com/kb/HT211289 Vendor Advisory
https://support.apple.com/kb/HT211290 Vendor Advisory
https://support.apple.com/kb/HT211291 Vendor Advisory
https://support.apple.com/kb/HT211293 Vendor Advisory
https://support.apple.com/kb/HT211294 Vendor Advisory
https://support.apple.com/kb/HT211295 Vendor Advisory
https://support.apple.com/kb/HT211843 Vendor Advisory
https://support.apple.com/kb/HT211844 Vendor Advisory
https://support.apple.com/kb/HT211850 Vendor Advisory
https://support.apple.com/kb/HT211931 Vendor Advisory
https://support.apple.com/kb/HT211935 Vendor Advisory
https://support.apple.com/kb/HT211952 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:41

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2020/Dec/32 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Dec/32 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2020/Nov/19 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Nov/19 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2020/Nov/20 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Nov/20 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2020/Nov/22 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Nov/22 - Mailing List, Third Party Advisory
References () https://support.apple.com/kb/HT211288 - Vendor Advisory () https://support.apple.com/kb/HT211288 - Vendor Advisory
References () https://support.apple.com/kb/HT211289 - Vendor Advisory () https://support.apple.com/kb/HT211289 - Vendor Advisory
References () https://support.apple.com/kb/HT211290 - Vendor Advisory () https://support.apple.com/kb/HT211290 - Vendor Advisory
References () https://support.apple.com/kb/HT211291 - Vendor Advisory () https://support.apple.com/kb/HT211291 - Vendor Advisory
References () https://support.apple.com/kb/HT211293 - Vendor Advisory () https://support.apple.com/kb/HT211293 - Vendor Advisory
References () https://support.apple.com/kb/HT211294 - Vendor Advisory () https://support.apple.com/kb/HT211294 - Vendor Advisory
References () https://support.apple.com/kb/HT211295 - Vendor Advisory () https://support.apple.com/kb/HT211295 - Vendor Advisory
References () https://support.apple.com/kb/HT211843 - Vendor Advisory () https://support.apple.com/kb/HT211843 - Vendor Advisory
References () https://support.apple.com/kb/HT211844 - Vendor Advisory () https://support.apple.com/kb/HT211844 - Vendor Advisory
References () https://support.apple.com/kb/HT211850 - Vendor Advisory () https://support.apple.com/kb/HT211850 - Vendor Advisory
References () https://support.apple.com/kb/HT211931 - Vendor Advisory () https://support.apple.com/kb/HT211931 - Vendor Advisory
References () https://support.apple.com/kb/HT211935 - Vendor Advisory () https://support.apple.com/kb/HT211935 - Vendor Advisory
References () https://support.apple.com/kb/HT211952 - Vendor Advisory () https://support.apple.com/kb/HT211952 - Vendor Advisory

Information

Published : 2020-10-22 18:15

Updated : 2024-11-21 05:41


NVD link : CVE-2020-9876

Mitre link : CVE-2020-9876

CVE.ORG link : CVE-2020-9876


JSON object : View

Products Affected

apple

  • iphone_os
  • icloud
  • ipados
  • macos
  • itunes
  • mac_os_x
  • tvos
  • watchos
CWE
CWE-787

Out-of-bounds Write