var-202104-0160
Vulnerability from variot
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of IOCTL 0x1000C in the AppleIntelKBLGraphics kext. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers. Apple macOS security vulnerability, currently there is no information about this vulnerability, please keep an eye on CNNVD or manufacturer announcements. Information about the security content is also available at https://support.apple.com/HT212011.
AMD Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2020-27914: Yu Wang of Didi Research America CVE-2020-27915: Yu Wang of Didi Research America
App Store Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to gain elevated privileges Description: This issue was addressed by removing the vulnerable code. CVE-2020-27941: shrek_wzw
AppleMobileFileIntegrity Available for: macOS Big Sur 11.0.1 Impact: A malicious application may be able to bypass Privacy preferences Description: This issue was addressed with improved checks. CVE-2020-29621: Wojciech Reguła (@_r3ggi) of SecuRing
Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-27910: JunDong Xie and XingWei Lin of Ant Security Light- Year Lab
Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9943: JunDong Xie of Ant Security Light-Year Lab
Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9944: JunDong Xie of Ant Security Light-Year Lab
Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27916: JunDong Xie of Ant Security Light-Year Lab
Bluetooth Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected application termination or heap corruption Description: Multiple integer overflows were addressed with improved input validation. CVE-2020-27906: Zuozhi Fan (@pattern_F_) of Ant Group Tianqiong Security Lab
CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab
CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9960: JunDong Xie and XingWei Lin of Ant Security Light-Year Lab CVE-2020-27908: JunDong Xie and XingWei Lin of Ant Security Light- Year Lab
CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-10017: Francis working with Trend Micro Zero Day Initiative, JunDong Xie of Ant Security Light-Year Lab
CoreText Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A logic issue was addressed with improved state management. CVE-2020-27922: Mickey Jin of Trend Micro
FontParser Available for: macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An information disclosure issue was addressed with improved state management. CVE-2020-27946: Mateusz Jurczyk of Google Project Zero
FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A buffer overflow was addressed with improved size validation. CVE-2020-9962: Yiğit Can YILMAZ (@yilmazcanyigit)
FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27952: an anonymous researcher, Mickey Jin and Junzhi Lu of Trend Micro
FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9956: Mickey Jin and Junzhi Lu of Trend Micro Mobile Security Research Team working with Trend Micro’s Zero Day Initiative
FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. CVE-2020-27931: Apple CVE-2020-27943: Mateusz Jurczyk of Google Project Zero CVE-2020-27944: Mateusz Jurczyk of Google Project Zero
Foundation Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A local user may be able to read arbitrary files Description: A logic issue was addressed with improved state management. CVE-2020-10002: James Hutchins
Graphics Drivers Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2020-27947: ABC Research s.r.o. working with Trend Micro Zero Day Initiative
Graphics Drivers Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-29612: ABC Research s.r.o. working with Trend Micro Zero Day Initiative
HomeKit Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An attacker in a privileged network position may be able to unexpectedly alter application state Description: This issue was addressed with improved setting propagation. CVE-2020-9978: Luyi Xing, Dongfang Zhao, and Xiaofeng Wang of Indiana University Bloomington, Yan Jia of Xidian University and University of Chinese Academy of Sciences, and Bin Yuan of HuaZhong University of Science and Technology
Image Processing Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27919: Hou JingYi (@hjy79425575) of Qihoo 360 CERT, Xingwei Lin of Ant Security Light-Year Lab
ImageIO Available for: macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2020-29616: zhouat working with Trend Micro Zero Day Initiative
ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-27924: Lei Sun CVE-2020-29618: XingWei Lin of Ant Security Light-Year Lab
ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-29611: Ivan Fratric of Google Project Zero
ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to heap corruption Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-29617: XingWei Lin of Ant Security Light-Year Lab CVE-2020-29619: XingWei Lin of Ant Security Light-Year Lab
ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27912: Xingwei Lin of Ant Security Light-Year Lab CVE-2020-27923: Lei Sun
Intel Graphics Driver Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-10015: ABC Research s.r.o. working with Trend Micro Zero Day Initiative CVE-2020-27897: Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc. and Luyi Xing of Indiana University Bloomington
Intel Graphics Driver Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2020-27907: ABC Research s.r.o. working with Trend Micro Zero Day Initiative
Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to determine kernel memory layout Description: A logic issue was addressed with improved state management. CVE-2020-10016: Alex Helie
Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2020-27921: Linus Henze (pinauten.de)
Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application may cause unexpected changes in memory belonging to processes traced by DTrace Description: This issue was addressed with improved checks to prevent unauthorized actions. CVE-2020-27949: Steffen Klee (@_kleest) of TU Darmstadt, Secure Mobile Networking Lab
Kernel Available for: macOS Big Sur 11.0.1 Impact: A malicious application may be able to elevate privileges Description: This issue was addressed with improved entitlements. CVE-2020-29620: Csaba Fitzl (@theevilbit) of Offensive Security
libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An integer overflow was addressed through improved input validation. CVE-2020-27911: found by OSS-Fuzz
libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing maliciously crafted web content may lead to code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-27920: found by OSS-Fuzz
libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-27926: found by OSS-Fuzz
libxpc Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to break out of its sandbox Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2020-10014: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab
Logging Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A local attacker may be able to elevate their privileges Description: A path handling issue was addressed with improved validation. CVE-2020-10010: Tommy Muir (@Muirey03)
Model I/O Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-13524: Aleksandar Nikolic of Cisco Talos
Model I/O Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: A logic issue was addressed with improved state management. CVE-2020-10004: Aleksandar Nikolic of Cisco Talos
NSRemoteView Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved restrictions. CVE-2020-27901: Thijs Alkemade of Computest Research Division
Power Management Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to determine kernel memory layout Description: A logic issue was addressed with improved state management. CVE-2020-10007: singi@theori working with Trend Micro Zero Day Initiative
Quick Look Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted document may lead to a cross site scripting attack Description: An access issue was addressed with improved access restrictions. CVE-2020-10012: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu of Palo Alto Networks (paloaltonetworks.com)
Ruby Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to modify the file system Description: A path handling issue was addressed with improved validation. CVE-2020-27896: an anonymous researcher
System Preferences Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved state management. CVE-2020-10009: Thijs Alkemade of Computest Research Division
WebRTC Available for: macOS Big Sur 11.0.1 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-15969: an anonymous researcher
Wi-Fi Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An attacker may be able to bypass Managed Frame Protection Description: A denial of service issue was addressed with improved state handling. CVE-2020-27898: Stephan Marais of University of Johannesburg
Installation note:
macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl/YBj8ACgkQZcsbuWJ6 jjCVjw//QGrhMvU+nyuS1UwWs7rcqDJDNh0Zb7yUJali2Bdc9/l++i2pLFbmAwes 7AYCag+T3h3aP7YJAN13zb8KBmUcmnWkWupfx8kEGqHxSXnQTXvaEI59RyCobOCj OVPtboPMH1d94+6dABMp9kiLAHoZezm3hdF8ShT2Hqgq2TB16wZsa/EvhJVSaduA 7RttG6EHBTin6UU3M/+vcfJWqkg4O0YuZpQaconDa5Pd81jpUMeduzfRvS5i+PVS cehtHPWjCN15+sQ29q11yhP3v+sYh0DJEl2LWaBnDo2TlC1gHx70H5ZsAFLHChcd rXkl1tm6GV3UWVhFq0jQc1DP+IwbuL6jHI/wIjYx7itk9XECppyhhiuImOaLiIUH CBgAjwVHY1GUdTH97iPEQFF61v3sjpRLleLMZW7+9ZTt4pEDwMVHk9vKgVK5BUa6 lrKWtBHL3AtaXtxC9y8XGe3IYEBLAszHMUJfF1BR+D/niDRlztvoj72/3PPwtk2t tuUE9RGzpSXCQ1CX6vW7zS2ddVmQfJqcPX721k4OVpFNlMXkjZkm2Q/xwr5qq99v Up9BA+ITksthGYfGAY5bBV1LsjK1NtdNHQGpZe4l9bu4ONgUvmL8iBb/LnS6wKB1 HGcdHEmXvbx+Akl/fvTdG8RSvyoYuFJHkuYv0DMWiri8yN1q+C4= =osnP -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-0160", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "macos", "scope": null, "trust": 11.2, "vendor": "apple", "version": null }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.15" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.15.7" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.14.6" }, { "model": "macos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "11.1" }, { "model": "macos", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "11.0" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.15.7" }, { "model": "mac os x", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.14.6" }, { "model": "mac os x", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "10.14" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-397" }, { "db": "ZDI", "id": "ZDI-21-396" }, { "db": "ZDI", "id": "ZDI-21-395" }, { "db": "ZDI", "id": "ZDI-21-394" }, { "db": "ZDI", "id": "ZDI-21-393" }, { "db": "ZDI", "id": "ZDI-21-392" }, { "db": "ZDI", "id": "ZDI-21-391" }, { "db": "ZDI", "id": "ZDI-21-390" }, { "db": "ZDI", "id": "ZDI-21-387" }, { "db": "ZDI", "id": "ZDI-21-386" }, { "db": "ZDI", "id": "ZDI-21-382" }, { "db": "ZDI", "id": "ZDI-21-381" }, { "db": "ZDI", "id": "ZDI-21-379" }, { "db": "ZDI", "id": "ZDI-21-486" }, { "db": "ZDI", "id": "ZDI-20-1403" }, { "db": "ZDI", "id": "ZDI-20-1402" }, { "db": "NVD", "id": "CVE-2020-27897" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ABC Research s.r.o.", "sources": [ { "db": "ZDI", "id": "ZDI-21-397" }, { "db": "ZDI", "id": "ZDI-21-396" }, { "db": "ZDI", "id": "ZDI-21-395" }, { "db": "ZDI", "id": "ZDI-21-394" }, { "db": "ZDI", "id": "ZDI-21-393" }, { "db": "ZDI", "id": "ZDI-21-392" }, { "db": "ZDI", "id": "ZDI-21-391" }, { "db": "ZDI", "id": "ZDI-21-390" }, { "db": "ZDI", "id": "ZDI-21-387" }, { "db": "ZDI", "id": "ZDI-21-386" }, { "db": "ZDI", "id": "ZDI-21-382" }, { "db": "ZDI", "id": "ZDI-21-381" }, { "db": "ZDI", "id": "ZDI-21-379" }, { "db": "ZDI", "id": "ZDI-21-486" }, { "db": "ZDI", "id": "ZDI-20-1403" }, { "db": "ZDI", "id": "ZDI-20-1402" } ], "trust": 11.2 }, "cve": "CVE-2020-27897", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2020-27897", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-372008", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "ZDI", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2020-27897", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 11.2, "userInteraction": "NONE", "vectorString": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-27897", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "ZDI", "id": "CVE-2020-27897", "trust": 11.2, "value": "HIGH" }, { "author": "nvd@nist.gov", "id": "CVE-2020-27897", "trust": 1.0, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-372008", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2020-27897", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-397" }, { "db": "ZDI", "id": "ZDI-21-396" }, { "db": "ZDI", "id": "ZDI-21-395" }, { "db": "ZDI", "id": "ZDI-21-394" }, { "db": "ZDI", "id": "ZDI-21-393" }, { "db": "ZDI", "id": "ZDI-21-392" }, { "db": "ZDI", "id": "ZDI-21-391" }, { "db": "ZDI", "id": "ZDI-21-390" }, { "db": "ZDI", "id": "ZDI-21-387" }, { "db": "ZDI", "id": "ZDI-21-386" }, { "db": "ZDI", "id": "ZDI-21-382" }, { "db": "ZDI", "id": "ZDI-21-381" }, { "db": "ZDI", "id": "ZDI-21-379" }, { "db": "ZDI", "id": "ZDI-21-486" }, { "db": "ZDI", "id": "ZDI-20-1403" }, { "db": "ZDI", "id": "ZDI-20-1402" }, { "db": "VULHUB", "id": "VHN-372008" }, { "db": "VULMON", "id": "CVE-2020-27897" }, { "db": "NVD", "id": "CVE-2020-27897" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of IOCTL 0x1000C in the AppleIntelKBLGraphics kext. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers. Apple macOS security vulnerability, currently there is no information about this vulnerability, please keep an eye on CNNVD or manufacturer announcements. Information\nabout the security content is also available at\nhttps://support.apple.com/HT212011. \n\nAMD\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to execute arbitrary code\nwith system privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2020-27914: Yu Wang of Didi Research America\nCVE-2020-27915: Yu Wang of Didi Research America\n\nApp Store\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to gain elevated privileges\nDescription: This issue was addressed by removing the vulnerable\ncode. \nCVE-2020-27941: shrek_wzw\n\nAppleMobileFileIntegrity\nAvailable for: macOS Big Sur 11.0.1\nImpact: A malicious application may be able to bypass Privacy\npreferences\nDescription: This issue was addressed with improved checks. \nCVE-2020-29621: Wojciech Regu\u0142a (@_r3ggi) of SecuRing\n\nAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-27910: JunDong Xie and XingWei Lin of Ant Security Light-\nYear Lab\n\nAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2020-9943: JunDong Xie of Ant Security Light-Year Lab\n\nAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to read restricted memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2020-9944: JunDong Xie of Ant Security Light-Year Lab\n\nAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-27916: JunDong Xie of Ant Security Light-Year Lab\n\nBluetooth\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A remote attacker may be able to cause unexpected application\ntermination or heap corruption\nDescription: Multiple integer overflows were addressed with improved\ninput validation. \nCVE-2020-27906: Zuozhi Fan (@pattern_F_) of Ant Group Tianqiong\nSecurity Lab\n\nCoreAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab\n\nCoreAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-9960: JunDong Xie and XingWei Lin of Ant Security Light-Year\nLab\nCVE-2020-27908: JunDong Xie and XingWei Lin of Ant Security Light-\nYear Lab\n\nCoreAudio\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted audio file may lead to\narbitrary code execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-10017: Francis working with Trend Micro Zero Day Initiative,\nJunDong Xie of Ant Security Light-Year Lab\n\nCoreText\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-27922: Mickey Jin of Trend Micro\n\nFontParser\nAvailable for: macOS Big Sur 11.0.1\nImpact: Processing a maliciously crafted font may result in the\ndisclosure of process memory\nDescription: An information disclosure issue was addressed with\nimproved state management. \nCVE-2020-27946: Mateusz Jurczyk of Google Project Zero\n\nFontParser\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A buffer overflow was addressed with improved size\nvalidation. \nCVE-2020-9962: Yi\u011fit Can YILMAZ (@yilmazcanyigit)\n\nFontParser\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-27952: an anonymous researcher, Mickey Jin and Junzhi Lu of\nTrend Micro\n\nFontParser\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-9956: Mickey Jin and Junzhi Lu of Trend Micro Mobile\nSecurity Research Team working with Trend Micro\u2019s Zero Day Initiative\n\nFontParser\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted font file may lead to\narbitrary code execution\nDescription: A memory corruption issue existed in the processing of\nfont files. \nCVE-2020-27931: Apple\nCVE-2020-27943: Mateusz Jurczyk of Google Project Zero\nCVE-2020-27944: Mateusz Jurczyk of Google Project Zero\n\nFoundation\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A local user may be able to read arbitrary files\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10002: James Hutchins\n\nGraphics Drivers\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2020-27947: ABC Research s.r.o. working with Trend Micro Zero Day\nInitiative\n\nGraphics Drivers\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: A malicious application may be able to execute arbitrary code\nwith system privileges\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-29612: ABC Research s.r.o. working with Trend Micro Zero Day\nInitiative\n\nHomeKit\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An attacker in a privileged network position may be able to\nunexpectedly alter application state\nDescription: This issue was addressed with improved setting\npropagation. \nCVE-2020-9978: Luyi Xing, Dongfang Zhao, and Xiaofeng Wang of Indiana\nUniversity Bloomington, Yan Jia of Xidian University and University\nof Chinese Academy of Sciences, and Bin Yuan of HuaZhong University\nof Science and Technology\n\nImage Processing\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-27919: Hou JingYi (@hjy79425575) of Qihoo 360 CERT, Xingwei\nLin of Ant Security Light-Year Lab\n\nImageIO\nAvailable for: macOS Big Sur 11.0.1\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2020-29616: zhouat working with Trend Micro Zero Day Initiative\n\nImageIO\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-27924: Lei Sun\nCVE-2020-29618: XingWei Lin of Ant Security Light-Year Lab\n\nImageIO\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-29611: Ivan Fratric of Google Project Zero\n\nImageIO\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: Processing a maliciously crafted image may lead to heap\ncorruption\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-29617: XingWei Lin of Ant Security Light-Year Lab\nCVE-2020-29619: XingWei Lin of Ant Security Light-Year Lab\n\nImageIO\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted image may lead to arbitrary\ncode execution\nDescription: An out-of-bounds write was addressed with improved input\nvalidation. \nCVE-2020-27912: Xingwei Lin of Ant Security Light-Year Lab\nCVE-2020-27923: Lei Sun\n\nIntel Graphics Driver\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: An out-of-bounds write issue was addressed with improved\nbounds checking. \nCVE-2020-10015: ABC Research s.r.o. working with Trend Micro Zero Day\nInitiative\nCVE-2020-27897: Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc. \nand Luyi Xing of Indiana University Bloomington\n\nIntel Graphics Driver\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2020-27907: ABC Research s.r.o. working with Trend Micro Zero Day\nInitiative\n\nKernel\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10016: Alex Helie\n\nKernel\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A remote attacker may be able to cause unexpected system\ntermination or corrupt kernel memory\nDescription: Multiple memory corruption issues were addressed with\nimproved input validation. \nCVE-2020-27921: Linus Henze (pinauten.de)\n\nKernel\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS\nBig Sur 11.0.1\nImpact: A malicious application may cause unexpected changes in\nmemory belonging to processes traced by DTrace\nDescription: This issue was addressed with improved checks to prevent\nunauthorized actions. \nCVE-2020-27949: Steffen Klee (@_kleest) of TU Darmstadt, Secure\nMobile Networking Lab\n\nKernel\nAvailable for: macOS Big Sur 11.0.1\nImpact: A malicious application may be able to elevate privileges\nDescription: This issue was addressed with improved entitlements. \nCVE-2020-29620: Csaba Fitzl (@theevilbit) of Offensive Security\n\nlibxml2\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A remote attacker may be able to cause unexpected application\ntermination or arbitrary code execution\nDescription: An integer overflow was addressed through improved input\nvalidation. \nCVE-2020-27911: found by OSS-Fuzz\n\nlibxml2\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing maliciously crafted web content may lead to code\nexecution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-27920: found by OSS-Fuzz\n\nlibxml2\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-27926: found by OSS-Fuzz\n\nlibxpc\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to break out of its\nsandbox\nDescription: A parsing issue in the handling of directory paths was\naddressed with improved path validation. \nCVE-2020-10014: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab\n\nLogging\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A local attacker may be able to elevate their privileges\nDescription: A path handling issue was addressed with improved\nvalidation. \nCVE-2020-10010: Tommy Muir (@Muirey03)\n\nModel I/O\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted USD file may lead to\nunexpected application termination or arbitrary code execution\nDescription: An out-of-bounds read was addressed with improved input\nvalidation. \nCVE-2020-13524: Aleksandar Nikolic of Cisco Talos\n\nModel I/O\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Opening a maliciously crafted file may lead to unexpected\napplication termination or arbitrary code execution\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10004: Aleksandar Nikolic of Cisco Talos\n\nNSRemoteView\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A logic issue was addressed with improved restrictions. \nCVE-2020-27901: Thijs Alkemade of Computest Research Division\n\nPower Management\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10007: singi@theori working with Trend Micro Zero Day\nInitiative\n\nQuick Look\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: Processing a maliciously crafted document may lead to a cross\nsite scripting attack\nDescription: An access issue was addressed with improved access\nrestrictions. \nCVE-2020-10012: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu\nof Palo Alto Networks (paloaltonetworks.com)\n\nRuby\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A remote attacker may be able to modify the file system\nDescription: A path handling issue was addressed with improved\nvalidation. \nCVE-2020-27896: an anonymous researcher\n\nSystem Preferences\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2020-10009: Thijs Alkemade of Computest Research Division\n\nWebRTC\nAvailable for: macOS Big Sur 11.0.1\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2020-15969: an anonymous researcher\n\nWi-Fi\nAvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7\nImpact: An attacker may be able to bypass Managed Frame Protection\nDescription: A denial of service issue was addressed with improved\nstate handling. \nCVE-2020-27898: Stephan Marais of University of Johannesburg\n\nInstallation note:\n\nmacOS Big Sur 11.1, Security Update 2020-001 Catalina, Security\nUpdate 2020-007 Mojave may be obtained from the Mac App Store or\nApple\u0027s Software Downloads web site:\nhttps://support.apple.com/downloads/\n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nHGcdHEmXvbx+Akl/fvTdG8RSvyoYuFJHkuYv0DMWiri8yN1q+C4=\n=osnP\n-----END PGP SIGNATURE-----\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2020-27897" }, { "db": "ZDI", "id": "ZDI-21-386" }, { "db": "ZDI", "id": "ZDI-20-1402" }, { "db": "ZDI", "id": "ZDI-20-1403" }, { "db": "ZDI", "id": "ZDI-21-486" }, { "db": "ZDI", "id": "ZDI-21-379" }, { "db": "ZDI", "id": "ZDI-21-381" }, { "db": "ZDI", "id": "ZDI-21-396" }, { "db": "ZDI", "id": "ZDI-21-397" }, { "db": "ZDI", "id": "ZDI-21-387" }, { "db": "ZDI", "id": "ZDI-21-390" }, { "db": "ZDI", "id": "ZDI-21-391" }, { "db": "ZDI", "id": "ZDI-21-392" }, { "db": "ZDI", "id": "ZDI-21-393" }, { "db": "ZDI", "id": "ZDI-21-394" }, { "db": "ZDI", "id": "ZDI-21-395" }, { "db": "ZDI", "id": "ZDI-21-382" }, { "db": "VULHUB", "id": "VHN-372008" }, { "db": "VULMON", "id": "CVE-2020-27897" }, { "db": "PACKETSTORM", "id": "160538" } ], "trust": 11.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-27897", "trust": 12.5 }, { "db": "ZDI", "id": "ZDI-21-486", "trust": 1.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11961", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-397", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11960", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-396", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11623", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-395", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11621", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-394", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11619", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-393", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11618", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-392", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11617", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-391", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11616", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-390", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11586", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-387", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11585", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-386", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11493", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-382", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11473", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-381", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11470", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-21-379", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11959", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11209", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-1403", "trust": 0.7 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-11208", "trust": 0.7 }, { "db": "ZDI", "id": "ZDI-20-1402", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "160538", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-372008", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-27897", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-397" }, { "db": "ZDI", "id": "ZDI-21-396" }, { "db": "ZDI", "id": "ZDI-21-395" }, { "db": "ZDI", "id": "ZDI-21-394" }, { "db": "ZDI", "id": "ZDI-21-393" }, { "db": "ZDI", "id": "ZDI-21-392" }, { "db": "ZDI", "id": "ZDI-21-391" }, { "db": "ZDI", "id": "ZDI-21-390" }, { "db": "ZDI", "id": "ZDI-21-387" }, { "db": "ZDI", "id": "ZDI-21-386" }, { "db": "ZDI", "id": "ZDI-21-382" }, { "db": "ZDI", "id": "ZDI-21-381" }, { "db": "ZDI", "id": "ZDI-21-379" }, { "db": "ZDI", "id": "ZDI-21-486" }, { "db": "ZDI", "id": "ZDI-20-1403" }, { "db": "ZDI", "id": "ZDI-20-1402" }, { "db": "VULHUB", "id": "VHN-372008" }, { "db": "VULMON", "id": "CVE-2020-27897" }, { "db": "PACKETSTORM", "id": "160538" }, { "db": "NVD", "id": "CVE-2020-27897" } ] }, "id": "VAR-202104-0160", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-372008" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T22:39:12.341000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Apple has issued an update to correct this vulnerability.", "trust": 9.1, "url": "https://support.apple.com/en-us/HT212011" }, { "title": "Apple has issued an update to correct this vulnerability.", "trust": 0.7, "url": "https://support.apple.com/HT212011" }, { "title": "Apple: macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=60a51a6d3f600c46241622f208f75bff" }, { "title": "macOS-iOS-system-security", "trust": 0.1, "url": "https://github.com/houjingyi233/macOS-iOS-system-security " }, { "title": "sec-daily-2020", "trust": 0.1, "url": "https://github.com/alphaSeclab/sec-daily-2020 " } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-397" }, { "db": "ZDI", "id": "ZDI-21-396" }, { "db": "ZDI", "id": "ZDI-21-395" }, { "db": "ZDI", "id": "ZDI-21-394" }, { "db": "ZDI", "id": "ZDI-21-393" }, { "db": "ZDI", "id": "ZDI-21-392" }, { "db": "ZDI", "id": "ZDI-21-391" }, { "db": "ZDI", "id": "ZDI-21-390" }, { "db": "ZDI", "id": "ZDI-21-387" }, { "db": "ZDI", "id": "ZDI-21-386" }, { "db": "ZDI", "id": "ZDI-21-382" }, { "db": "ZDI", "id": "ZDI-21-381" }, { "db": "ZDI", "id": "ZDI-21-379" }, { "db": "ZDI", "id": "ZDI-21-486" }, { "db": "VULMON", "id": "CVE-2020-27897" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-372008" }, { "db": "NVD", "id": "CVE-2020-27897" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 10.2, "url": "https://support.apple.com/en-us/ht212011" }, { "trust": 1.1, "url": "https://www.zerodayinitiative.com/advisories/zdi-21-486/" }, { "trust": 1.1, "url": "https://support.apple.com/en-us/ht211931" }, { "trust": 0.7, "url": "https://support.apple.com/ht212011" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10014" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-13524" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27903" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27910" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27897" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27907" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-15969" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27912" }, { "trust": 0.1, "url": "https://support.apple.com/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27901" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27896" }, { "trust": 0.1, "url": "https://support.apple.com/ht212011." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27898" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27914" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27908" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27911" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10009" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27915" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10004" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10002" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27916" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10010" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10012" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-27906" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-10007" } ], "sources": [ { "db": "ZDI", "id": "ZDI-21-397" }, { "db": "ZDI", "id": "ZDI-21-396" }, { "db": "ZDI", "id": "ZDI-21-395" }, { "db": "ZDI", "id": "ZDI-21-394" }, { "db": "ZDI", "id": "ZDI-21-393" }, { "db": "ZDI", "id": "ZDI-21-392" }, { "db": "ZDI", "id": "ZDI-21-391" }, { "db": "ZDI", "id": "ZDI-21-390" }, { "db": "ZDI", "id": "ZDI-21-387" }, { "db": "ZDI", "id": "ZDI-21-386" }, { "db": "ZDI", "id": "ZDI-21-382" }, { "db": "ZDI", "id": "ZDI-21-381" }, { "db": "ZDI", "id": "ZDI-21-379" }, { "db": "ZDI", "id": "ZDI-21-486" }, { "db": "VULHUB", "id": "VHN-372008" }, { "db": "PACKETSTORM", "id": "160538" }, { "db": "NVD", "id": "CVE-2020-27897" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-21-397" }, { "db": "ZDI", "id": "ZDI-21-396" }, { "db": "ZDI", "id": "ZDI-21-395" }, { "db": "ZDI", "id": "ZDI-21-394" }, { "db": "ZDI", "id": "ZDI-21-393" }, { "db": "ZDI", "id": "ZDI-21-392" }, { "db": "ZDI", "id": "ZDI-21-391" }, { "db": "ZDI", "id": "ZDI-21-390" }, { "db": "ZDI", "id": "ZDI-21-387" }, { "db": "ZDI", "id": "ZDI-21-386" }, { "db": "ZDI", "id": "ZDI-21-382" }, { "db": "ZDI", "id": "ZDI-21-381" }, { "db": "ZDI", "id": "ZDI-21-379" }, { "db": "ZDI", "id": "ZDI-21-486" }, { "db": "ZDI", "id": "ZDI-20-1403" }, { "db": "ZDI", "id": "ZDI-20-1402" }, { "db": "VULHUB", "id": "VHN-372008" }, { "db": "VULMON", "id": "CVE-2020-27897" }, { "db": "PACKETSTORM", "id": "160538" }, { "db": "NVD", "id": "CVE-2020-27897" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-397" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-396" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-395" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-394" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-393" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-392" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-391" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-390" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-387" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-386" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-382" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-381" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-379" }, { "date": "2021-04-28T00:00:00", "db": "ZDI", "id": "ZDI-21-486" }, { "date": "2020-12-08T00:00:00", "db": "ZDI", "id": "ZDI-20-1403" }, { "date": "2020-12-08T00:00:00", "db": "ZDI", "id": "ZDI-20-1402" }, { "date": "2021-04-02T00:00:00", "db": "VULHUB", "id": "VHN-372008" }, { "date": "2021-04-02T00:00:00", "db": "VULMON", "id": "CVE-2020-27897" }, { "date": "2020-12-16T17:58:29", "db": "PACKETSTORM", "id": "160538" }, { "date": "2021-04-02T18:15:15.090000", "db": "NVD", "id": "CVE-2020-27897" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-397" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-396" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-395" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-394" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-393" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-392" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-391" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-390" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-387" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-386" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-382" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-381" }, { "date": "2021-03-30T00:00:00", "db": "ZDI", "id": "ZDI-21-379" }, { "date": "2021-04-28T00:00:00", "db": "ZDI", "id": "ZDI-21-486" }, { "date": "2020-12-08T00:00:00", "db": "ZDI", "id": "ZDI-20-1403" }, { "date": "2020-12-08T00:00:00", "db": "ZDI", "id": "ZDI-20-1402" }, { "date": "2021-05-04T00:00:00", "db": "VULHUB", "id": "VHN-372008" }, { "date": "2021-05-04T00:00:00", "db": "VULMON", "id": "CVE-2020-27897" }, { "date": "2024-11-21T05:22:00.443000", "db": "NVD", "id": "CVE-2020-27897" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple macOS AppleIntelKBLGraphics IOCTL 0x10011 Out-Of-Bounds Write Privilege Escalation Vulnerability", "sources": [ { "db": "ZDI", "id": "ZDI-21-397" } ], "trust": 0.7 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "overflow, code execution", "sources": [ { "db": "PACKETSTORM", "id": "160538" } ], "trust": 0.1 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.