CVE-2020-27930
A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9,...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- October 27, 2020
- Published Date
- December 08, 2020
- Last Updated
- January 29, 2025
- Vendor
- Apple
- Product
- watchOS, iOS and iPadOS, macOS
- Description
- A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. Processing a maliciously crafted font may lead to arbitrary code execution.
CVSS Scores
SSVC Information
- Exploitation
- active
- Technical Impact
- total
References
https://support.apple.com/en-us/HT211931
https://support.apple.com/en-us/HT211928
https://support.apple.com/en-us/HT211929
https://support.apple.com/en-us/HT211940
https://support.apple.com/en-us/HT211944
https://support.apple.com/en-us/HT211945
https://support.apple.com/en-us/HT211946
https://support.apple.com/en-us/HT211947
http://seclists.org/fulldisclosure/2020/Dec/32
http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2021-11-03 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
FunPhishing/Apple-Safari-Remote-Code-Execution-CVE-2020-27930
Type: github • Created: 2021-02-07 11:28:21 UTC • Stars: 0
Apple Safari Remote Code Execution