First published: Thu Nov 05 2020(Updated: )
ImageIO. An out-of-bounds write was addressed with improved input validation.
Credit: Xingwei Lin Ant Security LightLei Sun Xingwei Lin product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.0.1 | 11.0.1 |
tvOS | <14.2 | 14.2 |
Apple macOS | <11.1 | 11.1 |
macOS Catalina | ||
macOS Mojave | ||
Apple iOS, iPadOS, and watchOS | <7.1 | 7.1 |
Apple iOS and iPadOS | <14.2 | 14.2 |
Apple iOS, iPadOS, and macOS | <14.2 | 14.2 |
Apple iOS and macOS | <11.1.0 | |
Apple iOS, iPadOS, and macOS | <14.2 | |
iPhone OS | <14.2 | |
Apple iOS and macOS | <11.0.1 | |
tvOS | <14.2 | |
Apple iOS, iPadOS, and watchOS | <7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-27923 is a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted image file.
CVE-2020-27923 affects Apple iOS versions up to 14.2, Apple iPadOS versions up to 14.2, Apple tvOS versions up to 14.2, Apple macOS Big Sur versions up to 11.0.1, and Apple watchOS versions up to 7.1.
To fix CVE-2020-27923, update your Apple devices to the latest available software version.
Yes, you can find more information about CVE-2020-27923 and its mitigations on the official Apple support website: [reference 1](https://support.apple.com/en-us/HT211929), [reference 2](https://support.apple.com/en-us/HT211930), [reference 3](https://support.apple.com/en-us/HT212011).
CVE-2020-27923 is associated with CWE-20, which is the weakness category for improper input validation.