First published: Thu Nov 05 2020(Updated: )
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 14.2 and iPadOS 14.2, iCloud for Windows 11.5, tvOS 14.2, iTunes 12.11 for Windows. Processing maliciously crafted web content may lead to code execution.
Credit: found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <12.11 | 12.11 |
Apple iCloud for Windows | <11.5 | 11.5 |
Apple macOS Big Sur | <11.0.1 | 11.0.1 |
Apple watchOS | <7.1 | 7.1 |
Apple tvOS | <14.2 | 14.2 |
Apple iOS | <14.2 | 14.2 |
Apple iPadOS | <14.2 | 14.2 |
Apple Icloud Windows | <11.5 | |
Apple Itunes Windows | <12.11 | |
Apple iPadOS | <14.2 | |
Apple iPhone OS | <14.2 | |
Apple macOS | >=11.0<11.0.1 | |
Apple tvOS | <14.2 | |
Apple watchOS | <7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2020-27917 is a use after free vulnerability in libxml2 library.
The severity of CVE-2020-27917 is not mentioned.
CVE-2020-27917 can be exploited by an attacker to execute arbitrary code or cause a denial-of-service condition.
Yes, a fix for CVE-2020-27917 has been provided by Apple.
You can find more information about CVE-2020-27917 on the Apple support website.