ID

VAR-202010-1288


CVE

CVE-2020-9887


TITLE

macOS Memory Corruption Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-010471

DESCRIPTION

A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6. Viewing a maliciously crafted JPEG file may lead to arbitrary code execution. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the ImageIO library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.The specific flaw exists within the AppleVPA framework. Crafted data in a JPEG image can trigger a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Apple macOS Catalina is a set of dedicated operating systems developed by Apple for Mac computers

Trust: 2.43

sources: NVD: CVE-2020-9887 // JVNDB: JVNDB-2020-010471 // ZDI: ZDI-20-1182 // VULHUB: VHN-188012 // VULMON: CVE-2020-9887

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:ltversion:10.15.6

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.13.6

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.13.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.14.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15.5

Trust: 0.8

vendor:applemodel:macosscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-20-1182 // JVNDB: JVNDB-2020-010471 // NVD: CVE-2020-9887

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9887
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-010471
value: HIGH

Trust: 0.8

ZDI: CVE-2020-9887
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202010-1219
value: HIGH

Trust: 0.6

VULHUB: VHN-188012
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-9887
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-9887
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-010471
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-188012
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-9887
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-010471
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2020-9887
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-1182 // VULHUB: VHN-188012 // VULMON: CVE-2020-9887 // JVNDB: JVNDB-2020-010471 // CNNVD: CNNVD-202010-1219 // NVD: CVE-2020-9887

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-188012 // JVNDB: JVNDB-2020-010471 // NVD: CVE-2020-9887

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202010-1219

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202010-1219

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-010471

PATCH

title:HT211289url:https://support.apple.com/en-us/HT211289

Trust: 0.8

title:HT211289url:https://support.apple.com/ja-jp/HT211289

Trust: 0.8

title:Apple has issued an update to correct this vulnerability.url:https://support.apple.com/HT211289

Trust: 0.7

title:Apple macOS Catalina Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=131681

Trust: 0.6

sources: ZDI: ZDI-20-1182 // JVNDB: JVNDB-2020-010471 // CNNVD: CNNVD-202010-1219

EXTERNAL IDS

db:NVDid:CVE-2020-9887

Trust: 3.3

db:JVNid:JVNVU94090210

Trust: 0.8

db:JVNDBid:JVNDB-2020-010471

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-11106

Trust: 0.7

db:ZDIid:ZDI-20-1182

Trust: 0.7

db:CNNVDid:CNNVD-202010-1219

Trust: 0.7

db:NSFOCUSid:50080

Trust: 0.6

db:CNVDid:CNVD-2020-60824

Trust: 0.1

db:VULHUBid:VHN-188012

Trust: 0.1

db:VULMONid:CVE-2020-9887

Trust: 0.1

sources: ZDI: ZDI-20-1182 // VULHUB: VHN-188012 // VULMON: CVE-2020-9887 // JVNDB: JVNDB-2020-010471 // CNNVD: CNNVD-202010-1219 // NVD: CVE-2020-9887

REFERENCES

url:https://support.apple.com/kb/ht211289

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-9887

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9887

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94090210/index.html

Trust: 0.8

url:https://support.apple.com/ht211289

Trust: 0.7

url:http://www.nsfocus.net/vulndb/50080

Trust: 0.6

url:https://support.apple.com/en-us/ht211289

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: ZDI: ZDI-20-1182 // VULHUB: VHN-188012 // VULMON: CVE-2020-9887 // JVNDB: JVNDB-2020-010471 // CNNVD: CNNVD-202010-1219 // NVD: CVE-2020-9887

CREDITS

Mickey Jin of Trend Micro Mobile Security Research Team

Trust: 0.7

sources: ZDI: ZDI-20-1182

SOURCES

db:ZDIid:ZDI-20-1182
db:VULHUBid:VHN-188012
db:VULMONid:CVE-2020-9887
db:JVNDBid:JVNDB-2020-010471
db:CNNVDid:CNNVD-202010-1219
db:NVDid:CVE-2020-9887

LAST UPDATE DATE

2024-11-23T21:28:40.396000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-1182date:2020-09-16T00:00:00
db:VULHUBid:VHN-188012date:2021-07-21T00:00:00
db:VULMONid:CVE-2020-9887date:2020-10-27T00:00:00
db:JVNDBid:JVNDB-2020-010471date:2021-01-19T05:15:48
db:CNNVDid:CNNVD-202010-1219date:2021-10-29T00:00:00
db:NVDid:CVE-2020-9887date:2024-11-21T05:41:28.353

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-1182date:2020-09-16T00:00:00
db:VULHUBid:VHN-188012date:2020-10-22T00:00:00
db:VULMONid:CVE-2020-9887date:2020-10-22T00:00:00
db:JVNDBid:JVNDB-2020-010471date:2021-01-19T05:15:48
db:CNNVDid:CNNVD-202010-1219date:2020-10-22T00:00:00
db:NVDid:CVE-2020-9887date:2020-10-22T18:15:15.253