ID

VAR-202004-1966


CVE

CVE-2020-9785


TITLE

plural Apple Product Corruption Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2020-003558

DESCRIPTION

Multiple memory corruption issues were addressed with improved state management. This issue is fixed in iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2. A malicious application may be able to execute arbitrary code with kernel privileges. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple iPadOS is an operating system for iPad tablets. Kernel is one of the kernel components. A memory corruption vulnerability exists in the Kernel component of several Apple products. The following products and versions are affected: iOS prior to 13.4; iPadOS prior to 13.4; watchOS prior to 6.2; tvOS prior to 13.4; macOS Catalina prior to 10.15.4. Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNATURE----- Version: BCPG v1.64 iQIcBAEDCAAGBQJeejDTAAoJEAc+Lhnt8tDNWTIQAKGhA+iQc47adRlNt49MEvtt wJC+FVUyln9eSvCfK1D9tqUJJWMpmSCtQ8B2wNT7iHHOpW3KWjWKVqTdQjB5ndTs UlcIkLB5YPQxuX9E8v+HoX3roX3PiaDoHo4yc/CmHeWw7ojQD2MgimO0Bqk9fJuM yY9cJXl+fgKiguxbGRD5WGRYHvMlS5wt2KX0GIM3GOPX91rbbvfN8S4Eey3gqsSA tx+kRjOm3Jzt1icEAKzE86JML2KBsonpYOD8JeYnu3FAfFNwlBWH4+gwkYrUeuXP 39AhNXF3yXghauZ0CLU3ekFl9S2edK5bwmuouDAfZIK2phcSk6XtDDJEuHyRvHIi cDUtFQy6z9/P+AwgJBKIQO5JlQUwN+du/RcLXpkJ80Kn/HliuIp64Qd4lIPv9Ekc zOLGKw9tA0wI+gystYbF6RokgeS37HmO+ivZlEUbujPhhTisoqDbh1Ebx2GgWN5A 0AnoybklupZNY33YKYG1bKnDX77iMpNcY24rfSFs8zYxeDCdMBakZB0mp7aqEH+h k2Ur4KFgGUrWsKLBVQZA72Qr7O3+Q/z3jJtOSY28HzHcdxXSuNO3oc96s/rID4aC 4NHldBBoJMK92/ukTjC++AVijTOWWAxRtnAXEPaCcRNp6mDLVhJTm08/44jijKy4 uBy7TA1wLL3sLdqRIr7h =shBp -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-03-24-2 macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra are now available and address the following: Apple HSSPI Support Available for: macOS Catalina 10.15.3 Impact: An application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2020-3904: Proteas of Qihoo 360 Nirvan Team AppleMobileFileIntegrity Available for: macOS Catalina 10.15.3 Impact: An application may be able to use arbitrary entitlements Description: This issue was addressed with improved checks. CVE-2020-3883: Linus Henze (pinauten.de) Bluetooth Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS Catalina 10.15.3 Impact: A local user may be able to cause unexpected system termination or read kernel memory Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-3907: Yu Wang of Didi Research America CVE-2020-3908: Yu Wang of Didi Research America CVE-2020-3912: Yu Wang of Didi Research America Bluetooth Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6 Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2019-8853: Jianjun Dai of Qihoo 360 Alpha Lab Bluetooth Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS Catalina 10.15.3 Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2020-3892: Yu Wang of Didi Research America CVE-2020-3893: Yu Wang of Didi Research America CVE-2020-3905: Yu Wang of Didi Research America Call History Available for: macOS Catalina 10.15.3 Impact: A malicious application may be able to access a user's call history Description: This issue was addressed with a new entitlement. CVE-2020-9776: Benjamin Randazzo (@____benjamin) CoreFoundation Available for: macOS Catalina 10.15.3 Impact: A malicious application may be able to elevate privileges Description: A permissions issue existed. This issue was addressed with improved permission validation. CVE-2020-3913: Timo Christ of Avira Operations GmbH & Co. KG FaceTime Available for: macOS Catalina 10.15.3 Impact: A local user may be able to view sensitive user information Description: A logic issue was addressed with improved state management. CVE-2020-3881: Yuval Ron, Amichai Shulman and Eli Biham of Technion - Israel Institute of Technology Icons Available for: macOS Catalina 10.15.3 Impact: A malicious application may be able to identify what other applications a user has installed Description: The issue was addressed with improved handling of icon caches. CVE-2020-9773: Chilik Tamir of Zimperium zLabs Intel Graphics Driver Available for: macOS Catalina 10.15.3 Impact: A malicious application may disclose restricted memory Description: An information disclosure issue was addressed with improved state management. CVE-2019-14615: Wenjian HE of Hong Kong University of Science and Technology, Wei Zhang of Hong Kong University of Science and Technology, Sharad Sinha of Indian Institute of Technology Goa, and Sanjeev Das of University of North Carolina IOHIDFamily Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS Catalina 10.15.3 Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory initialization issue was addressed with improved memory handling. CVE-2020-3919: an anonymous researcher IOThunderboltFamily Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6 Impact: An application may be able to gain elevated privileges Description: A use after free issue was addressed with improved memory management. CVE-2020-3851: Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc. and Luyi Xing of Indiana University Bloomington Kernel Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS Catalina 10.15.3 Impact: An application may be able to read restricted memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2020-9785: Proteas of Qihoo 360 Nirvan Team libxml2 Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS Catalina 10.15.3 Impact: Multiple issues in libxml2 Description: A buffer overflow was addressed with improved bounds checking. CVE-2020-3909: LGTM.com CVE-2020-3911: found by OSS-Fuzz libxml2 Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS Catalina 10.15.3 Impact: Multiple issues in libxml2 Description: A buffer overflow was addressed with improved size validation. CVE-2020-3910: LGTM.com Mail Available for: macOS High Sierra 10.13.6, macOS Catalina 10.15.3 Impact: A remote attacker may be able to cause arbitrary javascript code execution Description: An injection issue was addressed with improved validation. CVE-2020-3884: Apple sudo Available for: macOS Catalina 10.15.3 Impact: An attacker may be able to run commands as a non-existent user Description: This issue was addressed by updating to sudo version 1.8.31. CVE-2019-19232 TCC Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.3 Impact: A maliciously crafted application may be able to bypass code signing enforcement Description: A logic issue was addressed with improved restrictions. CVE-2020-3906: Patrick Wardle of Jamf Vim Available for: macOS Catalina 10.15.3 Impact: Multiple issues in Vim Description: Multiple issues were addressed by updating to version 8.1.1850. CVE-2020-9769: Steve Hahn from LinkedIn Additional recognition CoreText We would like to acknowledge an anonymous researcher for their assistance. FireWire Audio We would like to acknowledge Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc. and Luyi Xing of Indiana University Bloomington for their assistance. FontParser We would like to acknowledge Matthew Denton of Google Chrome for their assistance. Install Framework Legacy We would like to acknowledge Pris Sears of Virginia Tech, Tom Lynch of UAL Creative Computing Institute, and an anonymous researcher for their assistance. LinkPresentation We would like to acknowledge Travis for their assistance. OpenSSH We would like to acknowledge an anonymous researcher for their assistance. rapportd We would like to acknowledge Alexander Heinrich (@Sn0wfreeze) of Technische Universität Darmstadt for their assistance. Sidecar We would like to acknowledge Rick Backley (@rback_sec) for their assistance. Installation note: macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ -----BEGIN PGP SIGNATURE----- Version: BCPG v1.64 iQIcBAEDCAAGBQJeejDOAAoJEAc+Lhnt8tDNTtkP/RRnnsXeWXRjFHoRf7P+npKE Je0ZSoqv08Tgmv+Q0voSdCFZjFAqKXviVgZTGFT7LsuUWqdZEATxkB1fevt7t3Bl qXWNGpna3mGqWl6I2cWKxVOHT9fysO/31ADgFIwgOWSodvImNdp/JBpOcyRqcFJc B3TpNq8xtKSpWBVrq0TVHRWMu87VJHkGi78jAJ4x7qgXyWICf3usa9ajqYqzV99m 6/DrIH4s2Um2zJVi4YyzK0+rR2B2Q1eO8CFuzUB9D1HKCEnRXoRfALFC8v83p7cC m46CarISSrnMEYkxNhxsOGQbcMyBR3GDNZlo8/Y+Syqgwp3AKWbRFUDDM9vbCv6F z1fkWBmGftcd6G8dqO0dMAR6asglg9z2/GF/+3pZh5Mmmd7EBX+YeA84BhDTTsTs 671Af+F8OxSqgRV8qe+dbiFbD9qylM1luJD98PzoiFMO3h29fS41ofpuA6BTrdQN JPWY0NwTS11xQb11LHhXm7nF9vsrCIIspauOfkLbpCx6AWJQ/FpPyIXBYUEJ50ho NWWv4jmT+v8PSC2tSM0yMeI4OJX/+yd91uKLqzGGr1x2zshrXoMx0VDpg8HJkLfT y7CSgFrBGO8AgrcsZ6I8nDleoBsrEpLh2qEil7GexwoyUrVvfxCueW0shv4Oo4gf ZHp7Jd+FZIoCP69dNnxG =AUHy -----END PGP SIGNATURE-----

Trust: 1.98

sources: NVD: CVE-2020-9785 // JVNDB: JVNDB-2020-003558 // VULHUB: VHN-187910 // PACKETSTORM: 156900 // PACKETSTORM: 156894 // PACKETSTORM: 156896

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:ltversion:10.15.4

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:13.4

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:13.4

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:13.4

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:6.2

Trust: 1.0

vendor:applemodel:iosscope:eqversion:13.4 未満 (ipod touch 第 7 世代)

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.4 未満 (ipad air 2 以降)

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:13.4 未満 (apple tv 4k)

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.4 未満 (ipad mini 4 以降)

Trust: 0.8

vendor:applemodel:watchosscope:eqversion:6.4 未満 (apple watch series 1 以降)

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:13.4 未満 (apple tv hd)

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13.4 未満 (iphone 6s 以降)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15.3

Trust: 0.8

sources: JVNDB: JVNDB-2020-003558 // NVD: CVE-2020-9785

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9785
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-003558
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202003-1568
value: HIGH

Trust: 0.6

VULHUB: VHN-187910
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-9785
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-003558
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-187910
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-9785
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-003558
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-187910 // JVNDB: JVNDB-2020-003558 // CNNVD: CNNVD-202003-1568 // NVD: CVE-2020-9785

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-187910 // JVNDB: JVNDB-2020-003558 // NVD: CVE-2020-9785

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202003-1568

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202003-1568

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-003558

PATCH

title:HT211101url:https://support.apple.com/en-us/HT211101

Trust: 0.8

title:HT211100url:https://support.apple.com/en-us/HT211100

Trust: 0.8

title:HT211102url:https://support.apple.com/en-us/HT211102

Trust: 0.8

title:HT211103url:https://support.apple.com/en-us/HT211103

Trust: 0.8

title:HT211100url:https://support.apple.com/ja-jp/HT211100

Trust: 0.8

title:HT211102url:https://support.apple.com/ja-jp/HT211102

Trust: 0.8

title:HT211103url:https://support.apple.com/ja-jp/HT211103

Trust: 0.8

title:HT211101url:https://support.apple.com/ja-jp/HT211101

Trust: 0.8

title:Multiple Apple product Kernel Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=112980

Trust: 0.6

sources: JVNDB: JVNDB-2020-003558 // CNNVD: CNNVD-202003-1568

EXTERNAL IDS

db:NVDid:CVE-2020-9785

Trust: 2.8

db:JVNid:JVNVU96545608

Trust: 0.8

db:JVNDBid:JVNDB-2020-003558

Trust: 0.8

db:CNNVDid:CNNVD-202003-1568

Trust: 0.7

db:VULHUBid:VHN-187910

Trust: 0.1

db:PACKETSTORMid:156900

Trust: 0.1

db:PACKETSTORMid:156894

Trust: 0.1

db:PACKETSTORMid:156896

Trust: 0.1

sources: VULHUB: VHN-187910 // JVNDB: JVNDB-2020-003558 // PACKETSTORM: 156900 // PACKETSTORM: 156894 // PACKETSTORM: 156896 // CNNVD: CNNVD-202003-1568 // NVD: CVE-2020-9785

REFERENCES

url:https://support.apple.com/ht211100

Trust: 1.7

url:https://support.apple.com/ht211101

Trust: 1.7

url:https://support.apple.com/ht211102

Trust: 1.7

url:https://support.apple.com/ht211103

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-9785

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9785

Trust: 0.8

url:https://jvn.jp/vu/jvnvu96545608/

Trust: 0.8

url:https://support.apple.com/en-us/ht211101

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-3914

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-3911

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-3910

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-3909

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-9773

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-3883

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-3919

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-3901

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-3913

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9768

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-3897

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-3917

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-3900

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-3895

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-3891

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9769

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3903

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3851

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19232

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3905

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3907

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3893

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3884

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3906

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3912

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-8853

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3908

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3892

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9776

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14615

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3904

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3899

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3887

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3902

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9783

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3894

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3885

Trust: 0.1

sources: VULHUB: VHN-187910 // JVNDB: JVNDB-2020-003558 // PACKETSTORM: 156900 // PACKETSTORM: 156894 // PACKETSTORM: 156896 // CNNVD: CNNVD-202003-1568 // NVD: CVE-2020-9785

CREDITS

Apple

Trust: 0.3

sources: PACKETSTORM: 156900 // PACKETSTORM: 156894 // PACKETSTORM: 156896

SOURCES

db:VULHUBid:VHN-187910
db:JVNDBid:JVNDB-2020-003558
db:PACKETSTORMid:156900
db:PACKETSTORMid:156894
db:PACKETSTORMid:156896
db:CNNVDid:CNNVD-202003-1568
db:NVDid:CVE-2020-9785

LAST UPDATE DATE

2024-11-23T19:55:27.710000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-187910date:2021-07-21T00:00:00
db:JVNDBid:JVNDB-2020-003558date:2020-04-20T00:00:00
db:CNNVDid:CNNVD-202003-1568date:2021-10-29T00:00:00
db:NVDid:CVE-2020-9785date:2024-11-21T05:41:16.910

SOURCES RELEASE DATE

db:VULHUBid:VHN-187910date:2020-04-01T00:00:00
db:JVNDBid:JVNDB-2020-003558date:2020-04-20T00:00:00
db:PACKETSTORMid:156900date:2020-03-25T14:30:03
db:PACKETSTORMid:156894date:2020-03-25T14:22:53
db:PACKETSTORMid:156896date:2020-03-25T14:25:02
db:CNNVDid:CNNVD-202003-1568date:2020-03-25T00:00:00
db:NVDid:CVE-2020-9785date:2020-04-01T18:15:18.207