First published: Wed Jul 15 2020(Updated: )
A buffer overflow was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution.
Credit: Holger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom SecurityHolger Fuhrmannek Deutsche Telekom Security product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Catalina | <10.15.6 | 10.15.6 |
Apple Mojave | ||
Apple High Sierra | ||
Apple iPadOS | <13.6 | |
Apple iPhone OS | <13.6 | |
Apple Mac OS X | >=10.14.6<10.15.6 | |
Apple tvOS | <13.4.8 | |
Apple watchOS | <6.2.8 | |
Apple tvOS | <13.4.8 | 13.4.8 |
Apple iOS | <13.6 | 13.6 |
Apple iPadOS | <13.6 | 13.6 |
Apple watchOS | <6.2.8 | 6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-9880 is a vulnerability in Model I/O that allows for a buffer overflow due to insufficient bounds checking.
macOS Catalina (version up to 10.15.6), Mojave, High Sierra, iOS (version up to 13.6), iPadOS (version up to 13.6), watchOS (version up to 6.2.8), and tvOS (version up to 13.4.8) are affected by CVE-2020-9880.
CVE-2020-9880 has a severity score of 7.4 (High).
The remedy for CVE-2020-9880 is to update the affected software to the specified versions: macOS Catalina 10.15.6, iOS 13.6, iPadOS 13.6, watchOS 6.2.8, and tvOS 13.4.8.
You can find more information about CVE-2020-9880 on the Apple support page: [https://support.apple.com/en-us/HT211289](https://support.apple.com/en-us/HT211289).