First published: Thu Nov 05 2020(Updated: )
CoreAudio. An out-of-bounds read was addressed with improved input validation.
Credit: JunDong Xie Xingwei Lin Ant Security LightAnonymous Trend Micro Zero Day InitiativeXingWei Lin Ant Security Light product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.0.1 | 11.0.1 |
tvOS | <14.2 | 14.2 |
Apple macOS | <11.1 | 11.1 |
macOS Catalina | ||
macOS Mojave | ||
Apple iOS, iPadOS, and watchOS | <14.2 | 14.2 |
Apple iOS, iPadOS, and watchOS | <14.2 | 14.2 |
Apple iOS, iPadOS, and watchOS | <7.1 | 7.1 |
Apple iOS, iPadOS, and watchOS | <14.2 | |
iOS | <14.2 | |
Apple iOS and macOS | <11.0.1 | |
tvOS | <14.2 | |
Apple iOS, iPadOS, and watchOS | <7.1 | |
Apple iOS and macOS | <11.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-27908.
The title of this vulnerability is CoreAudio. An out-of-bounds read was addressed with improved input validation.
The affected software includes Apple iOS, Apple iPadOS, Apple tvOS, Apple macOS Big Sur, Apple watchOS, Apple Catalina, and Apple Mojave.
The severity of CVE-2020-27908 is not specified in the information provided.
To fix this vulnerability, update your software to the specified versions: Apple iOS 14.2, Apple iPadOS 14.2, Apple tvOS 14.2, Apple macOS Big Sur 11.0.1, Apple watchOS 7.1, Apple macOS Big Sur 11.1, Apple Catalina, and Apple Mojave.