First published: Wed Jul 15 2020(Updated: )
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. Processing a maliciously crafted font file may lead to arbitrary code execution.
Credit: Xingwei Lin Ant Security Light product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.8 | 13.4.8 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <6.2.8 | 6.2.8 |
Apple iOS, iPadOS, and watchOS | <13.6 | |
iOS | <13.6 | |
Apple iOS and macOS | <10.15.6 | |
tvOS | <13.4.8 | |
Apple iOS, iPadOS, and watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-9980 is an out-of-bounds write vulnerability in FontParser that allows attackers to overwrite memory beyond the bounds of a buffer.
CVE-2020-9980 affects macOS Catalina version up to and including 10.15.6, Apple Mojave, Apple High Sierra, iOS up to and including 13.6, iPadOS up to and including 13.6, watchOS up to and including 6.2.8, and tvOS up to and including 13.4.8.
To mitigate the impact of CVE-2020-9980, it is recommended to update affected software to the latest available version. For more information, refer to the official Apple Security Advisory.
You can find more information about CVE-2020-9980 in the official Apple Security Advisories: [https://support.apple.com/en-us/HT211289](https://support.apple.com/en-us/HT211289), [https://support.apple.com/en-us/HT211288](https://support.apple.com/en-us/HT211288), [https://support.apple.com/en-us/HT211291](https://support.apple.com/en-us/HT211291)