First published: Mon Dec 14 2020(Updated: )
A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in tvOS 14.3, iOS 14.3 and iPadOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.2. Processing a maliciously crafted font file may lead to arbitrary code execution.
Credit: Mateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project ZeroApple Mateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project ZeroMateusz Jurczyk Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Big Sur | <11.1 | 11.1 |
Apple Catalina | ||
Apple Mojave | ||
Apple watchOS | <7.2 | 7.2 |
Apple tvOS | <14.3 | 14.3 |
Apple iOS | <14.3 | 14.3 |
Apple iPadOS | <14.3 | 14.3 |
Apple Ipad Os | <14.3 | |
Apple iPhone OS | <14.3 | |
Apple macOS | <11.1.0 | |
Apple tvOS | <14.3 | |
Apple watchOS | <7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2020-27943.
The affected software includes Apple iOS, iPadOS, tvOS, macOS Big Sur, Catalina, Mojave, and watchOS.
The severity of CVE-2020-27943 is not specified in the information provided.
To fix CVE-2020-27943, update the affected software to the specified versions.
You can find more information about CVE-2020-27943 on the Apple support website.