First published: Thu Nov 12 2020(Updated: )
An integer overflow was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.0.1. Processing maliciously crafted web content may lead to arbitrary code execution.
Credit: product-security@apple.com Zhuo Liang Qihoo 360 Vulcan TeamZhuo Liang Qihoo 360 Vulcan Team
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Big Sur | <11.2 | 11.2 |
Apple Catalina | ||
Apple Mojave | ||
Apple macOS Big Sur | <11.0.1 | 11.0.1 |
Apple Mac OS X | >=10.14<10.14.6 | |
Apple Mac OS X | >=10.15<10.15.7 | |
Apple Mac OS X | =10.14.6 | |
Apple Mac OS X | =10.14.6-security_update_2019-004 | |
Apple Mac OS X | =10.14.6-security_update_2019-005 | |
Apple Mac OS X | =10.14.6-security_update_2019-006 | |
Apple Mac OS X | =10.14.6-security_update_2019-007 | |
Apple Mac OS X | =10.14.6-security_update_2020-001 | |
Apple Mac OS X | =10.14.6-security_update_2020-002 | |
Apple Mac OS X | =10.14.6-security_update_2020-003 | |
Apple Mac OS X | =10.14.6-security_update_2020-004 | |
Apple Mac OS X | =10.14.6-security_update_2020-005 | |
Apple Mac OS X | =10.14.6-security_update_2020-006 | |
Apple Mac OS X | =10.14.6-supplemental_update | |
Apple Mac OS X | =10.14.6-supplemental_update_2 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-supplemental_update | |
Apple macOS | >=11.0<11.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-27945.
The title of this vulnerability is 'CFNetwork Cache. An integer overflow was addressed with improved input validation.'
The severity level of CVE-2020-27945 has not been specified.
macOS Big Sur versions up to 11.0.1, macOS Big Sur versions up to 11.2, macOS Catalina, and macOS Mojave are affected by this vulnerability.
Apply the recommended patches provided by Apple for affected software versions or update to a non-affected version.