First published: Wed Sep 16 2020(Updated: )
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to execute arbitrary code with kernel privileges.
Credit: Proteas product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.0.1 | 11.0.1 |
tvOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <7.0 | 7.0 |
Apple iOS, iPadOS, and watchOS | <14.0 | |
iOS | <14.0 | |
Apple iOS and macOS | <11.0.1 | |
tvOS | <14.0 | |
Apple iOS, iPadOS, and watchOS | <7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this vulnerability is CVE-2020-9966.
The title of this vulnerability is 'Disk Images. An out-of-bounds read was addressed with improved input validation.'
This vulnerability can be exploited through an out-of-bounds read.
This vulnerability affects Apple tvOS 14.0, Apple iOS 14.0, Apple iPadOS 14.0, Apple macOS Big Sur 11.0.1, and Apple watchOS 7.0.
To fix this vulnerability, update to the latest version of the affected software.