First published: Wed Jul 15 2020(Updated: )
A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.
Credit: Holger Fuhrmannek Deutsche Telekom Security product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.8 | 13.4.8 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <6.2.8 | 6.2.8 |
Apple iOS, iPadOS, and watchOS | <13.6 | |
iOS | <13.6 | |
Apple iOS and macOS | >=10.14.6<10.15.6 | |
tvOS | <13.4.8 | |
Apple iOS, iPadOS, and watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-9880 is a vulnerability in Model I/O that allows for a buffer overflow due to insufficient bounds checking.
macOS Catalina (version up to 10.15.6), Mojave, High Sierra, iOS (version up to 13.6), iPadOS (version up to 13.6), watchOS (version up to 6.2.8), and tvOS (version up to 13.4.8) are affected by CVE-2020-9880.
CVE-2020-9880 has a severity score of 7.4 (High).
The remedy for CVE-2020-9880 is to update the affected software to the specified versions: macOS Catalina 10.15.6, iOS 13.6, iPadOS 13.6, watchOS 6.2.8, and tvOS 13.4.8.
You can find more information about CVE-2020-9880 on the Apple support page: [https://support.apple.com/en-us/HT211289](https://support.apple.com/en-us/HT211289).