### [CVE-2020-9967](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9967) ![](https://img.shields.io/static/v1?label=Product&message=iOS%20and%20iPadOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=macOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=tvOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=watchOS&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2011.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2011.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%2014.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%207.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20remote%20attacker%20may%20be%20able%20to%20cause%20unexpected%20system%20termination%20or%20corrupt%20kernel%20memory&color=brighgreen) ### Description Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, tvOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.0, iOS 14.0 and iPadOS 14.0. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory. ### POC #### Reference - http://packetstormsecurity.com/files/163501/XNU-Network-Stack-Kernel-Heap-Overflow.html - http://packetstormsecurity.com/files/163501/XNU-Network-Stack-Kernel-Heap-Overflow.html #### Github - https://github.com/SexyBeast233/SecBooks - https://github.com/Siguza/ios-resources - https://github.com/alexplaskett/Publications - https://github.com/alphaSeclab/sec-daily-2020 - https://github.com/houjingyi233/macOS-iOS-system-security