First published: Wed Sep 16 2020(Updated: )
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iCloud for Windows 11.4, iOS 14.0 and iPadOS 14.0, watchOS 7.0, tvOS 14.0, iCloud for Windows 7.21, iTunes for Windows 12.10.9. Processing a maliciously crafted tiff file may lead to a denial-of-service or potentially disclose memory contents.
Credit: Xingwei Lin AntXingwei Lin AntXingwei Lin AntXingwei Lin AntXingwei Lin AntXingwei Lin Ant product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iCloud for Windows | <7.21 | 7.21 |
Apple iTunes for Windows | <12.10.9 | 12.10.9 |
Apple iCloud for Windows | <11.4 | 11.4 |
Apple watchOS | <7.0 | 7.0 |
Apple tvOS | <14.0 | 14.0 |
Apple iOS | <14.0 | 14.0 |
Apple iPadOS | <14.0 | 14.0 |
Apple Icloud Windows | <7.21 | |
Apple Icloud Windows | >=11.0<11.4 | |
Apple Itunes Windows | <12.10.9 | |
Apple iPadOS | <14.0 | |
Apple iPhone OS | <14.0 | |
Apple macOS | <10.15.7 | |
Apple tvOS | <14.0 | |
Apple watchOS | <7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2020-36521 is a vulnerability in ImageIO that allows an attacker to read out-of-bounds memory due to improved input validation.
CVE-2020-36521 affects Apple tvOS up to version 14.0, Apple iOS up to version 14.0, Apple iPadOS up to version 14.0, Apple watchOS up to version 7.0, Apple iTunes for Windows up to version 12.10.9, and Apple iCloud for Windows up to version 11.4 and 7.21.
The severity of CVE-2020-36521 is not specified.
To mitigate CVE-2020-36521, update your software to the latest version provided by Apple.
You can find more information about CVE-2020-36521 on the Apple support website using the provided references.