CVE-2020-9876

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution.
References
Link Resource
http://seclists.org/fulldisclosure/2020/Dec/32 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/22 Mailing List Third Party Advisory
https://support.apple.com/kb/HT211288 Vendor Advisory
https://support.apple.com/kb/HT211289 Vendor Advisory
https://support.apple.com/kb/HT211290 Vendor Advisory
https://support.apple.com/kb/HT211291 Vendor Advisory
https://support.apple.com/kb/HT211293 Vendor Advisory
https://support.apple.com/kb/HT211294 Vendor Advisory
https://support.apple.com/kb/HT211295 Vendor Advisory
https://support.apple.com/kb/HT211843 Vendor Advisory
https://support.apple.com/kb/HT211844 Vendor Advisory
https://support.apple.com/kb/HT211850 Vendor Advisory
https://support.apple.com/kb/HT211931 Vendor Advisory
https://support.apple.com/kb/HT211935 Vendor Advisory
https://support.apple.com/kb/HT211952 Vendor Advisory
http://seclists.org/fulldisclosure/2020/Dec/32 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/19 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/20 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2020/Nov/22 Mailing List Third Party Advisory
https://support.apple.com/kb/HT211288 Vendor Advisory
https://support.apple.com/kb/HT211289 Vendor Advisory
https://support.apple.com/kb/HT211290 Vendor Advisory
https://support.apple.com/kb/HT211291 Vendor Advisory
https://support.apple.com/kb/HT211293 Vendor Advisory
https://support.apple.com/kb/HT211294 Vendor Advisory
https://support.apple.com/kb/HT211295 Vendor Advisory
https://support.apple.com/kb/HT211843 Vendor Advisory
https://support.apple.com/kb/HT211844 Vendor Advisory
https://support.apple.com/kb/HT211850 Vendor Advisory
https://support.apple.com/kb/HT211931 Vendor Advisory
https://support.apple.com/kb/HT211935 Vendor Advisory
https://support.apple.com/kb/HT211952 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2018-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-004:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2019-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.13.6:security_update_2020-003:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2020-10-22 18:15

Updated : 2024-11-21 05:41


NVD link : CVE-2020-9876

Mitre link : CVE-2020-9876

CVE.ORG link : CVE-2020-9876


JSON object : View

Products Affected

apple

  • itunes
  • tvos
  • icloud
  • watchos
  • ipados
  • mac_os_x
  • iphone_os
  • macos
CWE
CWE-787

Out-of-bounds Write