CWE
416
Advisory Published
Updated

CVE-2020-7463: Use After Free

First published: Fri Mar 26 2021(Updated: )

In FreeBSD 12.1-STABLE before r364644, 11.4-STABLE before r364651, 12.1-RELEASE before p9, 11.4-RELEASE before p3, and 11.3-RELEASE before p13, improper handling in the kernel causes a use-after-free bug by sending large user messages from multiple threads on the same SCTP socket. The use-after-free situation may result in unintended kernel behaviour including a kernel panic.

Credit: Megan2013678 Megan2013678 Megan2013678 Megan2013678 Megan2013678 Megan2013678 Megan2013678 secteam@freebsd.org

Affected SoftwareAffected VersionHow to fix
Apple Safari<14.1
14.1
Apple iTunes for Windows<12.11.3
12.11.3
Apple iCloud for Windows<12.3
12.3
Apple macOS Big Sur<11.3
11.3
Apple tvOS<14.5
14.5
Apple watchOS<7.4
7.4
Apple iOS<14.5
14.5
Apple iPadOS<14.5
14.5
FreeBSD FreeBSD=11.3
FreeBSD FreeBSD=11.3-p1
FreeBSD FreeBSD=11.3-p10
FreeBSD FreeBSD=11.3-p11
FreeBSD FreeBSD=11.3-p12
FreeBSD FreeBSD=11.3-p2
FreeBSD FreeBSD=11.3-p3
FreeBSD FreeBSD=11.3-p4
FreeBSD FreeBSD=11.3-p5
FreeBSD FreeBSD=11.3-p6
FreeBSD FreeBSD=11.3-p7
FreeBSD FreeBSD=11.3-p8
FreeBSD FreeBSD=11.3-p9
FreeBSD FreeBSD=11.4
FreeBSD FreeBSD=11.4-p1
FreeBSD FreeBSD=11.4-p2
FreeBSD FreeBSD=12.1
FreeBSD FreeBSD=12.1-p1
FreeBSD FreeBSD=12.1-p2
FreeBSD FreeBSD=12.1-p3
FreeBSD FreeBSD=12.1-p4
FreeBSD FreeBSD=12.1-p5
FreeBSD FreeBSD=12.1-p6
FreeBSD FreeBSD=12.1-p7
FreeBSD FreeBSD=12.1-p8
FreeBSD FreeBSD=12.2
Apple Icloud Windows<12.3
Apple Itunes Windows<12.11.3
Apple Safari<14.1
Apple iPadOS<14.5
Apple iPhone OS<14.5
Apple macOS>=11.0<11.3
Apple tvOS<14.5
Apple watchOS<7.4

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2020-7463?

    CVE-2020-7463 is a use after free vulnerability in WebRTC that has been addressed with improved memory management.

  • What is the impact of CVE-2020-7463?

    CVE-2020-7463 may allow a remote attacker to cause unexpected system termination or corrupt kernel memory.

  • Which software products are affected by CVE-2020-7463?

    The following Apple software products are affected by CVE-2020-7463: Safari 14.1, iOS 14.5, iPadOS 14.5, watchOS 7.4, iTunes for Windows 12.11.3, iCloud for Windows 12.3, macOS Big Sur 11.3, and tvOS 14.5.

  • How can I fix CVE-2020-7463?

    To fix CVE-2020-7463, it is recommended to update your affected Apple software products to the latest versions.

  • Where can I find more information about CVE-2020-7463?

    More information about CVE-2020-7463 can be found in the references provided by Apple: [Reference 1](https://support.apple.com/en-us/HT212321), [Reference 2](https://support.apple.com/en-us/HT212317), [Reference 3](https://support.apple.com/en-us/HT212318).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203