First published: Wed Jul 15 2020(Updated: )
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted audio file may lead to arbitrary code execution.
Credit: JunDong Xie XingWei Lin Ant product-security@apple.com Xingwei Lin Ant
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.8 | 13.4.8 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <6.2.8 | 6.2.8 |
Apple iOS, iPadOS, and watchOS | <13.6 | |
iOS | <13.6 | |
Apple iOS and macOS | <10.15.6 | |
tvOS | <13.4.8 | |
Apple iOS, iPadOS, and watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this audio vulnerability is CVE-2020-9891.
The audio vulnerability involves an out-of-bounds read that has been addressed with improved bounds checking.
The audio vulnerability affects macOS Catalina versions up to but not including 10.15.6, Mojave, High Sierra, iOS versions up to but not including 13.6, iPadOS versions up to but not including 13.6, watchOS versions up to but not including 6.2.8, and tvOS versions up to but not including 13.4.8.
To fix the audio vulnerability, update your software to the latest version. You can find more information on how to update your software on the Apple support website.
You can find more information about the audio vulnerability on the Apple support website. Please refer to the following links: [link1], [link2], [link3].