mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
174 lines
6.9 KiB
JSON
174 lines
6.9 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-3900",
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Apple",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "iOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "iOS 13.4 and iPadOS 13.4"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "tvOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "tvOS 13.4"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "watchOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "watchOS 6.2"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Safari",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "Safari 13.1"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "iTunes for Windows",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "iTunes for Windows 12.10.5"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "iCloud for Windows",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "iCloud for Windows 10.9.3"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "iCloud for Windows (Legacy)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "iCloud for Windows 7.18"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Processing maliciously crafted web content may lead to arbitrary code execution"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://support.apple.com/HT211102",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211102"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211101",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211101"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211103",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211103"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211104",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211104"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211105",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211105"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211106",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211106"
|
|
},
|
|
{
|
|
"url": "https://support.apple.com/HT211107",
|
|
"refsource": "MISC",
|
|
"name": "https://support.apple.com/HT211107"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[oss-security] 20200427 WebKitGTK and WPE WebKit Security Advisory WSA-2020-0005",
|
|
"url": "http://www.openwall.com/lists/oss-security/2020/04/27/3"
|
|
},
|
|
{
|
|
"refsource": "DEBIAN",
|
|
"name": "DSA-4681",
|
|
"url": "https://www.debian.org/security/2020/dsa-4681"
|
|
},
|
|
{
|
|
"refsource": "GENTOO",
|
|
"name": "GLSA-202006-08",
|
|
"url": "https://security.gentoo.org/glsa/202006-08"
|
|
}
|
|
]
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. Processing maliciously crafted web content may lead to arbitrary code execution."
|
|
}
|
|
]
|
|
}
|
|
} |