First published: Wed Jul 15 2020(Updated: )
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.
Credit: Holger Fuhrmannek Deutsche Telekom SecurityAleksandar Nikolic Cisco Talos product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.8 | 13.4.8 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <6.2.8 | 6.2.8 |
Apple iOS and iPadOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and macOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and macOS | <13.6 | |
iPhone OS | <13.6 | |
Apple iOS and macOS | <10.15.6 | |
tvOS | <13.4.8 | |
Apple iOS, iPadOS, and watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-9878 is a buffer overflow issue in Model I/O that has been addressed with improved memory handling.
Users of Apple macOS Catalina (up to version 10.15.6), Apple Mojave, Apple High Sierra, Apple iOS (up to version 13.6), Apple iPadOS (up to version 13.6), Apple watchOS (up to version 6.2.8), and Apple tvOS (up to version 13.4.8) are affected by CVE-2020-9878.
The severity of CVE-2020-9878 is not specified in the provided information.
To fix CVE-2020-9878, update your software to the available remedies provided by Apple for the affected products and versions.
You can find more information about CVE-2020-9878 on the following references: [link 1](https://support.apple.com/en-us/HT211289), [link 2](https://support.apple.com/en-us/HT211288), [link 3](https://support.apple.com/en-us/HT211291).