First published: Wed Jul 15 2020(Updated: )
Model I/O. A buffer overflow issue was addressed with improved memory handling.
Credit: Holger Fuhrmannek Deutsche Telekom SecurityAleksandar Nikolic Cisco Talos product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <6.2.8 | 6.2.8 |
Apple iOS, iPadOS, and watchOS | <13.6 | |
iOS | <13.6 | |
Apple iOS and macOS | >=10.14.6<10.15.6 | |
Apple iOS, iPadOS, and watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-9882 is a buffer overflow vulnerability in Model I/O that has been fixed with improved memory handling.
Yes, CVE-2020-9882 is a severe vulnerability due to the buffer overflow issue.
macOS Catalina 10.15.6, Apple Mojave, Apple High Sierra, iOS up to version 13.6, iPadOS up to version 13.6, and watchOS up to version 6.2.8 are affected by CVE-2020-9882.
To fix CVE-2020-9882, update your software to the recommended versions mentioned in the Apple support articles.
You can find more information about CVE-2020-9882 in the Apple support articles linked below: [Apple Support Article 1](https://support.apple.com/en-us/HT211289), [Apple Support Article 2](https://support.apple.com/en-us/HT211288), [Apple Support Article 3](https://support.apple.com/en-us/HT211291).