2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-9965" ,
"sourceIdentifier" : "product-security@apple.com" ,
"published" : "2020-12-08T20:15:17.230" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T05:41:36.623" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to execute arbitrary code with kernel privileges."
} ,
{
"lang" : "es" ,
"value" : "Se abord\u00f3 una lectura fuera de l\u00edmites con una comprobaci\u00f3n de entrada mejorada. Este problema se corrigi\u00f3 en macOS Big Sur versi\u00f3n 11.0.1, watchOS versi\u00f3n 7.0, tvOS versi\u00f3n 14.0, iOS versi\u00f3n 14.0 y iPadOS versi\u00f3n 14.0. Una aplicaci\u00f3n puede ser capaz de ejecutar c\u00f3digo arbitrario con privilegios de kernel"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:C/I:C/A:C" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 9.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "14.0" ,
"matchCriteriaId" : "10CC9ED4-9AE1-415A-94FF-60CB209506CA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "14.0" ,
"matchCriteriaId" : "16AF4D2F-3C55-4DCC-A253-3F8CB4F453EF"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "11.0.1" ,
"matchCriteriaId" : "F2EE75CC-3796-416A-9E58-64788BB89240"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "14.0" ,
"matchCriteriaId" : "0D16EC4D-D2E7-476D-BFBC-3703C8F0B45E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "7.0" ,
"matchCriteriaId" : "C117BCCF-7789-40BB-AD25-1E712F6DCF7C"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://seclists.org/fulldisclosure/2020/Dec/32" ,
"source" : "product-security@apple.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT211843" ,
"source" : "product-security@apple.com" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT211844" ,
"source" : "product-security@apple.com" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT211850" ,
"source" : "product-security@apple.com" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT211931" ,
"source" : "product-security@apple.com" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "http://seclists.org/fulldisclosure/2020/Dec/32" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT211843" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT211844" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT211850" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://support.apple.com/en-us/HT211931" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Release Notes" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}