René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

133 lines
4.3 KiB
JSON

{
"id": "CVE-2020-9859",
"sourceIdentifier": "product-security@apple.com",
"published": "2020-06-05T15:15:11.097",
"lastModified": "2023-01-09T16:41:59.350",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Apple 11-13.5 XNU Kernel Vulnerability",
"descriptions": [
{
"lang": "en",
"value": "A memory consumption issue was addressed with improved memory handling. This issue is fixed in iOS 13.5.1 and iPadOS 13.5.1, macOS Catalina 10.15.5 Supplemental Update, tvOS 13.4.6, watchOS 6.2.6. An application may be able to execute arbitrary code with kernel privileges."
},
{
"lang": "es",
"value": "Se abord\u00f3 un problema de consumo de memoria con un manejo de memoria mejorado. Este problema esta corregido en iOS versi\u00f3n 13.5.1 y iPadOS versi\u00f3n 13.5.1, Supplemental Update de macOS Catalina versi\u00f3n 10.15.5, tvOS versi\u00f3n 13.4.6, watchOS versi\u00f3n 6.2.6. Una aplicaci\u00f3n puede ser capaz de ejecutar c\u00f3digo arbitrario con privilegios de kernel"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.5.1",
"matchCriteriaId": "CDFF3251-4C9B-405D-8503-8CE07506D0FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.5.1",
"matchCriteriaId": "7F2B7D88-D736-4349-BC37-784A7F7EEF2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.15.5",
"matchCriteriaId": "99973242-A249-4C34-B042-5F833AE73708"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.4.6",
"matchCriteriaId": "A80F48C2-A93D-4A14-AC15-67286C512CCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.2.6",
"matchCriteriaId": "EB3938AE-A4F3-40EE-84D6-26CDE46CA151"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/HT211214",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}