First published: Tue Jan 28 2020(Updated: )
A logic issue was addressed with improved state management. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, tvOS 13.3.1, Safari 13.0.5, iTunes for Windows 12.10.4, iCloud for Windows 11.0, iCloud for Windows 7.17. Processing maliciously crafted web content may lead to universal cross site scripting.
Credit: an anonymous researcher an anonymous researcher an anonymous researcher an anonymous researcher an anonymous researcher an anonymous researcher product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <12.10.4 | 12.10.4 |
Apple iCloud for Windows | <10.9.2 | 10.9.2 |
Apple iCloud for Windows | <7.17 | 7.17 |
Apple Safari | <13.0.5 | 13.0.5 |
redhat/webkitgtk | <2.26.4 | 2.26.4 |
Apple iOS | <13.3.1 | 13.3.1 |
Apple iPadOS | <13.3.1 | 13.3.1 |
tvOS | <13.3.1 | 13.3.1 |
apple icloud windows | <7.17 | |
apple icloud windows | >=10.0<=10.8 | |
apple itunes windows | <12.10.4 | |
Apple Safari | <13.0.5 | |
Apple iPadOS | <13.3.1 | |
Apple iPhone OS | <13.3.1 | |
tvOS | <13.3.1 | |
openSUSE | =15.1 | |
WebKitGTK+ | <2.26.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-3867.
The affected software includes Apple Safari, Apple tvOS, Apple iCloud for Windows, Apple iTunes for Windows, Apple iOS, and Apple iPadOS.
The severity of CVE-2020-3867 is not specified.
To fix CVE-2020-3867, update to the latest available version of the affected software.
You can find more information about CVE-2020-3867 on the Apple support website.