First published: Wed Sep 16 2020(Updated: )
A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, iTunes for Windows 12.10.9. Processing a maliciously crafted text file may lead to arbitrary code execution.
Credit: Apple Apple Apple Apple Apple Mickey Jin & Junzhi Lu Trend Micro product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.0.1 | 11.0.1 |
tvOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <7.0 | 7.0 |
Apple iCloud | <11.5 | 11.5 |
iTunes | <12.10.9 | 12.10.9 |
Apple iOS and iPadOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and macOS | <14.0 | 14.0 |
iCloud for Windows | <11.5.0 | |
iTunes | <12.10.9 | |
Apple iOS, iPadOS, and macOS | <14.0 | |
iPhone OS | <14.0 | |
Apple iOS and macOS | <11.0.1 | |
tvOS | <14.0 | |
Apple iOS, iPadOS, and watchOS | <7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2020-9999.
The affected software for this vulnerability includes Apple tvOS up to version 14.0, Apple iOS up to version 14.0, Apple iPadOS up to version 14.0, Apple macOS Big Sur up to version 11.0.1, Apple watchOS up to version 7.0, Apple iTunes for Windows up to version 12.10.9, and Apple iCloud for Windows up to version 11.5.
The severity of CVE-2020-9999 is not mentioned in the provided information.
The memory corruption issue was addressed with improved state management.
You can find more information about this vulnerability on the Apple support website: - [CVE-2020-9999](https://support.apple.com/en-us/HT211952) - [Apple Security Updates](https://support.apple.com/en-us/HT211843) - [Apple Security Update 2020-103](https://support.apple.com/en-us/HT211935)