First published: Wed Jul 15 2020(Updated: )
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution.
Credit: Yu Zhou @yuzhou6666 Trend Micro Zero Day InitiativeAnonymous Trend MicroJunDong Xie Xingwei Lin AntYu Zhou @yuzhou6666 Trend Micro Zero Day InitiativeAnonymous Trend MicroJunDong Xie XingWei Lin AntYu Zhou @yuzhou6666 Trend Micro Zero Day InitiativeAnonymous Trend MicroJunDong Xie XingWei Lin AntYu Zhou @yuzhou6666 Trend Micro Zero Day InitiativeAnonymous Trend MicroJunDong Xie XingWei Lin Ant product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <13.6 | |
Apple iPhone OS | <13.6 | |
Apple Mac OS X | <10.15.6 | |
Apple tvOS | <13.4.8 | |
Apple watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2020-9884.
The affected software includes macOS Catalina (up to version 10.15.6), Mojave, High Sierra, iOS (up to version 13.6), iPadOS (up to version 13.6), watchOS (up to version 6.2.8), and tvOS (up to version 13.4.8).
The severity of CVE-2020-9884 is not specified in the provided information.
The remedy for this vulnerability is to update the affected software to the specified versions: macOS Catalina 10.15.6, iOS 13.6, iPadOS 13.6, watchOS 6.2.8, and tvOS 13.4.8.
You can find more information about CVE-2020-9884 on the Apple support website using the provided references: [link1], [link2], [link3].