First published: Wed Jul 15 2020(Updated: )
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution.
Credit: Yu Zhou @yuzhou6666 Trend Micro Zero Day InitiativeAnonymous Trend MicroJunDong Xie XingWei Lin Ant product-security@apple.com Xingwei Lin Ant
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.8 | 13.4.8 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <6.2.8 | 6.2.8 |
Apple iOS and iPadOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and macOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and macOS | <13.6 | |
iPhone OS | <13.6 | |
Apple iOS and macOS | <10.15.6 | |
tvOS | <13.4.8 | |
Apple iOS, iPadOS, and watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2020-9884.
The affected software includes macOS Catalina (up to version 10.15.6), Mojave, High Sierra, iOS (up to version 13.6), iPadOS (up to version 13.6), watchOS (up to version 6.2.8), and tvOS (up to version 13.4.8).
The severity of CVE-2020-9884 is not specified in the provided information.
The remedy for this vulnerability is to update the affected software to the specified versions: macOS Catalina 10.15.6, iOS 13.6, iPadOS 13.6, watchOS 6.2.8, and tvOS 13.4.8.
You can find more information about CVE-2020-9884 on the Apple support website using the provided references: [link1], [link2], [link3].