ID

VAR-202006-1631


CVE

CVE-2020-9837


TITLE

iOS and iPadOS Out-of-bounds read vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-006160

DESCRIPTION

An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5. A remote attacker may be able to leak memory. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-05-26-4 tvOS 13.4.5 tvOS 13.4.5 addresses the following: Accounts Available for: Apple TV 4K and Apple TV HD Impact: A remote attacker may be able to cause a denial of service Description: A denial of service issue was addressed with improved input validation. CVE-2020-9827: Jannik Lorenz of SEEMOO @ TU Darmstadt AppleMobileFileIntegrity Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to use arbitrary entitlements Description: This issue was addressed with improved checks. CVE-2020-9842: Linus Henze (pinauten.de) Audio Available for: Apple TV 4K and Apple TV HD Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9815: Yu Zhou (@yuzhou6666) working with Trend Micro Zero Day Initiative Audio Available for: Apple TV 4K and Apple TV HD Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9791: Yu Zhou (@yuzhou6666) working with Trend Micro Zero Day Initiative CoreText Available for: Apple TV 4K and Apple TV HD Impact: Processing a maliciously crafted text message may lead to application denial of service Description: A validation issue was addressed with improved input sanitization. CVE-2020-9829: Aaron Perris (@aaronp613), an anonymous researcher, an anonymous researcher, Carlos S Tech, Sam Menzies of Sam’s Lounge, Sufiyan Gouri of Lovely Professional University, India, Suleman Hasan Rathor of Arabic-Classroom.com FontParser Available for: Apple TV 4K and Apple TV HD Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9816: Peter Nguyen Vu Hoang of STAR Labs working with Trend Micro Zero Day Initiative ImageIO Available for: Apple TV 4K and Apple TV HD Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-3878: Samuel Groß of Google Project Zero ImageIO Available for: Apple TV 4K and Apple TV HD Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9789: Wenchao Li of VARAS@IIE CVE-2020-9790: Xingwei Lin of Ant-financial Light-Year Security Lab IPSec Available for: Apple TV 4K and Apple TV HD Impact: A remote attacker may be able to leak memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9837: Thijs Alkemade of Computest Kernel Available for: Apple TV 4K and Apple TV HD Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2020-9821: Xinru Chi and Tielei Wang of Pangu Lab Kernel Available for: Apple TV 4K and Apple TV HD Impact: A malicious application may be able to determine another application's memory layout Description: An information disclosure issue was addressed by removing the vulnerable code. CVE-2020-9797: an anonymous researcher Kernel Available for: Apple TV 4K and Apple TV HD Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: An integer overflow was addressed through improved input validation. CVE-2020-9852: Tao Huang and Tielei Wang of Pangu Lab Kernel Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2020-9795: Zhuo Liang of Qihoo 360 Vulcan Team Kernel Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to cause unexpected system termination or write kernel memory Description: A memory corruption issue was addressed with improved state management. CVE-2020-9808: Xinru Chi and Tielei Wang of Pangu Lab Kernel Available for: Apple TV 4K and Apple TV HD Impact: A local user may be able to read kernel memory Description: An information disclosure issue was addressed with improved state management. CVE-2020-9811: Tielei Wang of Pangu Lab CVE-2020-9812: Derrek (@derrekr6) Kernel Available for: Apple TV 4K and Apple TV HD Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A logic issue existed resulting in memory corruption. CVE-2020-9813: Xinru Chi of Pangu Lab CVE-2020-9814: Xinru Chi and Tielei Wang of Pangu Lab Kernel Available for: Apple TV 4K and Apple TV HD Impact: A malicious application may be able to determine kernel memory layout Description: An information disclosure issue was addressed with improved state management. CVE-2020-9809: Benjamin Randazzo (@____benjamin) Python Available for: Apple TV 4K and Apple TV HD Impact: A remote attacker may be able to cause arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2020-9793 SQLite Available for: Apple TV 4K and Apple TV HD Impact: A malicious application may cause a denial of service or potentially disclose memory contents Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9794 System Preferences Available for: Apple TV 4K and Apple TV HD Impact: An application may be able to gain elevated privileges Description: A race condition was addressed with improved state handling. CVE-2020-9839: @jinmo123, @setuid0x0_, and @insu_yun_en of @SSLab_Gatech working with Trend Micro’s Zero Day Initiative WebKit Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved restrictions. CVE-2020-9805: an anonymous researcher WebKit Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A logic issue was addressed with improved restrictions. CVE-2020-9802: Samuel Groß of Google Project Zero WebKit Available for: Apple TV 4K and Apple TV HD Impact: A remote attacker may be able to cause arbitrary code execution Description: A logic issue was addressed with improved restrictions. CVE-2020-9850: @jinmo123, @setuid0x0_, and @insu_yun_en of @SSLab_Gatech working with Trend Micro’s Zero Day Initiative WebKit Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may lead to a cross site scripting attack Description: An input validation issue was addressed with improved input validation. CVE-2020-9843: Ryan Pickren (ryanpickren.com) WebKit Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved validation. CVE-2020-9803: Wen Xu of SSLab at Georgia Tech WebKit Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2020-9806: Wen Xu of SSLab at Georgia Tech CVE-2020-9807: Wen Xu of SSLab at Georgia Tech WebKit Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed with improved memory handling. CVE-2020-9800: Brendan Draper (@6r3nd4n) working with Trend Micro Zero Day Initiative WebRTC Available for: Apple TV 4K and Apple TV HD Impact: Processing maliciously crafted web content may result in the disclosure of process memory Description: An access issue was addressed with improved memory management. CVE-2019-20503: Natalie Silvanovich of Google Project Zero zsh Available for: Apple TV 4K and Apple TV HD Impact: A local attacker may be able to elevate their privileges Description: An authorization issue was addressed with improved state management. CVE-2019-20044: Sam Foxman Additional recognition CoreText We would like to acknowledge Jiska Classen (@naehrdine) and Dennis Heinze (@ttdennis) of Secure Mobile Networking Lab for their assistance. ImageIO We would like to acknowledge Lei Sun for their assistance. IOHIDFamily We would like to acknowledge Andy Davis of NCC Group for their assistance. Kernel We would like to acknowledge Brandon Azad of Google Project Zero for their assistance. Safari We would like to acknowledge Luke Walker of Manchester Metropolitan University for their assistance. WebKit We would like to acknowledge Aidan Dunlap of UT Austin for their assistance. Installation note: Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> System -> Software Update -> Update Software." To check the current version of software, select "Settings -> General -> About." -----BEGIN PGP SIGNATURE----- Version: BCPG v1.64 iQIcBAEDCAAGBQJezV7eAAoJEAc+Lhnt8tDNGUEQAIqcHvrOcVu90wELj4q9d2Z/ LwyOmEKZu0s5QO5d2XuusXQig7etS+hQg4y4IEBc6+FbeHQ6geksjn4CEs0y1hs2 cIQHtXqOes5QRZx4joMGqC6rsS2U+DoSxtsxyKDrzhWCBJdz18JXG/5AdLQn9Zo4 QvUVVwNX61QiFGlUd5lL9QZWrh+FBxgilex7H9YpCVSzcTN5xcbe48zVjhpU/UFn KKKRK15aTzGqhmJ1zhvYUVLal4tfWV52QzWNbUW2UlPGxFORNpYKXCmQILk8eQGj FqIIjGrVcGYPnCDKbMfh24rEilYMzhDrQNg06uokgilPAUXC937lI88+G56Ayl9n ABOK/i04ni1FrmGkwRf/VEW6WV7k3bpXi5UTUZZCplfk19PoH8MIk1wUZ8AzActr lxK5DeHPKAG5Pl3dzkqKT8lQ/9aSozken7yQNz7AIo5Ib1ik88er4uu/SjV5CRka e0t8tkoL8MLIpMqUUpt7j+HgqB/R8VBQ6lBK0Jds2NI84XWXRTHF7UeeVo/BYoTj gdUqhL1B3vdIizxSemmbx70wVoHLU//JONHLJNE6dfGdNWeKHcqKfzZPbXo/4Hq/ ZDNj/cDOJTmChYqvG/Qi7AHlKACWpYMNnRsa6hMt99z24hdvPg2LP4ANf7Gi6Sq6 CnECyJL8Va3625vOipPF =ceKY -----END PGP SIGNATURE-----

Trust: 1.89

sources: NVD: CVE-2020-9837 // JVNDB: JVNDB-2020-006160 // VULHUB: VHN-187962 // VULMON: CVE-2020-9837 // PACKETSTORM: 157883

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:ltversion:13.5

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:13.4.5

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.5

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:13.5

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:13.4.5 未満 (apple tv 4k)

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.5 未満 (ipad air 2 以降)

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.5 未満 (ipad mini 4 以降)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.13.6

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13.5 未満 (ipod touch 第 7 世代)

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:13.4.5 未満 (apple tv hd)

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13.5 未満 (iphone 6s 以降)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15.4

Trust: 0.8

sources: JVNDB: JVNDB-2020-006160 // NVD: CVE-2020-9837

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9837
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-006160
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202005-1298
value: HIGH

Trust: 0.6

VULHUB: VHN-187962
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-9837
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-9837
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-006160
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-187962
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-9837
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-006160
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-187962 // VULMON: CVE-2020-9837 // JVNDB: JVNDB-2020-006160 // CNNVD: CNNVD-202005-1298 // NVD: CVE-2020-9837

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.9

sources: VULHUB: VHN-187962 // JVNDB: JVNDB-2020-006160 // NVD: CVE-2020-9837

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202005-1298

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202005-1298

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-006160

PATCH

title:HT211168url:https://support.apple.com/en-us/HT211168

Trust: 0.8

title:HT211170url:https://support.apple.com/en-us/HT211170

Trust: 0.8

title:HT211171url:https://support.apple.com/en-us/HT211171

Trust: 0.8

title:HT211171url:https://support.apple.com/ja-jp/HT211171

Trust: 0.8

title:HT211168url:https://support.apple.com/ja-jp/HT211168

Trust: 0.8

title:HT211170url:https://support.apple.com/ja-jp/HT211170

Trust: 0.8

title:Multiple Apple product IPSec Fix for component buffer error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=121025

Trust: 0.6

sources: JVNDB: JVNDB-2020-006160 // CNNVD: CNNVD-202005-1298

EXTERNAL IDS

db:NVDid:CVE-2020-9837

Trust: 2.7

db:JVNid:JVNVU98042162

Trust: 0.8

db:JVNDBid:JVNDB-2020-006160

Trust: 0.8

db:PACKETSTORMid:157883

Trust: 0.7

db:AUSCERTid:ESB-2020.1860

Trust: 0.6

db:NSFOCUSid:48622

Trust: 0.6

db:CNNVDid:CNNVD-202005-1298

Trust: 0.6

db:VULHUBid:VHN-187962

Trust: 0.1

db:VULMONid:CVE-2020-9837

Trust: 0.1

sources: VULHUB: VHN-187962 // VULMON: CVE-2020-9837 // JVNDB: JVNDB-2020-006160 // PACKETSTORM: 157883 // CNNVD: CNNVD-202005-1298 // NVD: CVE-2020-9837

REFERENCES

url:https://support.apple.com/ht211168

Trust: 1.8

url:https://support.apple.com/ht211170

Trust: 1.8

url:https://support.apple.com/ht211171

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-9837

Trust: 1.5

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9837

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98042162/index.html

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.1860/

Trust: 0.6

url:https://support.apple.com/kb/ht211168

Trust: 0.6

url:https://support.apple.com/en-us/ht211170

Trust: 0.6

url:http://www.nsfocus.net/vulndb/48622

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-32343

Trust: 0.6

url:https://support.apple.com/en-us/ht211168

Trust: 0.6

url:https://support.apple.com/kb/ht211170

Trust: 0.6

url:https://packetstormsecurity.com/files/157883/apple-security-advisory-2020-05-26-4.html

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://seclists.org/fulldisclosure/2020/may/59

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9807

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9809

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9806

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9813

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9795

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9827

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9814

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9811

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9829

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9802

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9797

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9808

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9790

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9821

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9800

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9816

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9789

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20044

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-3878

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9805

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9803

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9815

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9793

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9794

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9812

Trust: 0.1

sources: VULHUB: VHN-187962 // VULMON: CVE-2020-9837 // JVNDB: JVNDB-2020-006160 // PACKETSTORM: 157883 // CNNVD: CNNVD-202005-1298 // NVD: CVE-2020-9837

CREDITS

Apple

Trust: 0.7

sources: PACKETSTORM: 157883 // CNNVD: CNNVD-202005-1298

SOURCES

db:VULHUBid:VHN-187962
db:VULMONid:CVE-2020-9837
db:JVNDBid:JVNDB-2020-006160
db:PACKETSTORMid:157883
db:CNNVDid:CNNVD-202005-1298
db:NVDid:CVE-2020-9837

LAST UPDATE DATE

2024-11-23T20:26:30.509000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-187962date:2023-01-09T00:00:00
db:VULMONid:CVE-2020-9837date:2023-01-09T00:00:00
db:JVNDBid:JVNDB-2020-006160date:2020-07-02T00:00:00
db:CNNVDid:CNNVD-202005-1298date:2021-11-03T00:00:00
db:NVDid:CVE-2020-9837date:2024-11-21T05:41:22.460

SOURCES RELEASE DATE

db:VULHUBid:VHN-187962date:2020-06-09T00:00:00
db:VULMONid:CVE-2020-9837date:2020-06-09T00:00:00
db:JVNDBid:JVNDB-2020-006160date:2020-07-02T00:00:00
db:PACKETSTORMid:157883date:2020-05-29T19:07:47
db:CNNVDid:CNNVD-202005-1298date:2020-05-26T00:00:00
db:NVDid:CVE-2020-9837date:2020-06-09T17:15:14.503