{ "data_type": "CVE", "data_format": "MITRE", "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27930", "ASSIGNER": "product-security@apple.com", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "Apple", "product": { "product_data": [ { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "7.1" } ] } }, { "product_name": "iOS and iPadOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "14.2" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "11.0" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "12.4" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "6.2" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "5.3" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "2020" } ] } }, { "product_name": "macOS", "version": { "version_data": [ { "version_affected": "<", "version_value": "10.15" } ] } } ] } } ] } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing a maliciously crafted font may lead to arbitrary code execution.." } ] } ] }, "references": { "reference_data": [ { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211931", "name": "https://support.apple.com/en-us/HT211931" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211928", "name": "https://support.apple.com/en-us/HT211928" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211929", "name": "https://support.apple.com/en-us/HT211929" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211940", "name": "https://support.apple.com/en-us/HT211940" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211944", "name": "https://support.apple.com/en-us/HT211944" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211945", "name": "https://support.apple.com/en-us/HT211945" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211946", "name": "https://support.apple.com/en-us/HT211946" }, { "refsource": "MISC", "url": "https://support.apple.com/en-us/HT211947", "name": "https://support.apple.com/en-us/HT211947" }, { "refsource": "FULLDISC", "name": "20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1", "url": "http://seclists.org/fulldisclosure/2020/Dec/32" }, { "refsource": "MISC", "name": "http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html" } ] }, "description": { "description_data": [ { "lang": "eng", "value": "A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. Processing a maliciously crafted font may lead to arbitrary code execution." } ] } }