First published: Wed Sep 16 2020(Updated: )
A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
Credit: Brendan Draper @6r3nd4n Trend Micro Zero Day Initiative product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <14.0 | 14.0 |
Apple Safari | <14.0 | |
Webkit Webkitgtk\+ | <=2.30.3 | |
Debian Debian Linux | =10.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.2.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.1.0 | |
IBM Cloud Pak for Security (CP4S) | <=1.7.0.0 | |
debian/webkit2gtk | 2.44.2-1~deb11u1 2.44.3-1~deb11u1 2.44.2-1~deb12u1 2.44.3-1~deb12u1 2.44.3-1 2.44.4-1 | |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.44.3-1 2.44.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2020-9948.
The Safari web browser version up to but excluding 14.0 is affected by this vulnerability.
The severity level of CVE-2020-9948 has not been provided.
To fix this vulnerability, update your Safari web browser to version 14.0 or newer.
You can find more information about this vulnerability on the Apple support website at the following link: [https://support.apple.com/en-us/HT211845](https://support.apple.com/en-us/HT211845).