First published: Tue Jan 28 2020(Updated: )
A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. Processing a maliciously crafted string may lead to heap corruption.
Credit: Ian Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple tvOS | <13.3.1 | 13.3.1 |
Apple iOS | <13.3.1 | 13.3.1 |
Apple iPadOS | <13.3.1 | 13.3.1 |
Apple macOS Catalina | <10.15.3 | 10.15.3 |
Apple Mojave | ||
Apple High Sierra | ||
Apple watchOS | <6.1.2 | 6.1.2 |
Apple iPadOS | <13.3.1 | |
Apple iPhone OS | <13.3.1 | |
Apple Mac OS X | <10.15.3 | |
Apple tvOS | <13.3.1 | |
Apple watchOS | <6.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-3856 is a memory corruption issue in libxpc that has been addressed with improved input validation.
CVE-2020-3856 affects Apple tvOS, watchOS, iOS, iPadOS, macOS Catalina, Mojave, and High Sierra.
The severity of CVE-2020-3856 is not specified.
To fix CVE-2020-3856, update your Apple tvOS, watchOS, iOS, iPadOS, or macOS to the specified remedy versions.
You can find more information about CVE-2020-3856 on the following Apple support pages: [support.apple.com/en-us/HT210920](support.apple.com/en-us/HT210920), [support.apple.com/en-us/HT210921](support.apple.com/en-us/HT210921), [support.apple.com/en-us/HT210919](support.apple.com/en-us/HT210919)