ID

VAR-202012-0780


CVE

CVE-2020-27929


TITLE

iOS  of   group  FaceTime  Logic vulnerabilities in calls

Trust: 0.8

sources: JVNDB: JVNDB-2020-014254

DESCRIPTION

A logic issue existed in the handling of Group FaceTime calls. The issue was addressed with improved state management. This issue is fixed in iOS 12.4.9. A user may send video in Group FaceTime calls without knowing that they have done so. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. This vulnerability number has been assigned, and the vulnerability details will be updated soon. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-11-05-2 iOS 12.4.9 iOS 12.4.9 is now available and address the following issues. Information about the security content is also available at https://support.apple.com/HT211940. CVE-2020-27929: James P (@Jam_Penn) FontParser Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2 and 3, iPod touch (6th generation) Impact: Processing a maliciously crafted font may lead to arbitrary code execution. Apple is aware of reports that an exploit for this issue exists in the wild. CVE-2020-27930: Google Project Zero Kernel Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2 and 3, iPod touch (6th generation) Impact: A malicious application may be able to disclose kernel memory. Apple is aware of reports that an exploit for this issue exists in the wild. CVE-2020-27950: Google Project Zero Kernel Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2 and 3, iPod touch (6th generation) Impact: A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild. CVE-2020-27932: Google Project Zero Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "iOS 12.4.9". This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl+kfiwACgkQZcsbuWJ6 jjDngw//RguLwNx38u/bzvLSO9YOg4k1FOlRViWjznAtxG8TcFI27Bn5EJGvTCQL Be5sAgLarhYYg29fuap/zGqURzmHAUkygmb7SBlWsEagogPDYFLfFIvwTbKuC9XX n8v7LDAfpVKUmhPkLUuS78Gsk5RawQubYhHT7Q1I1KAixMirzQ39mH8dS6ZfRxpG 7f6qyYOP4a5kyXb7ALWZO6uZa4H1WgfMFpyk3VrEHE2s5A50zi6Lqj8IDepOSJAF eHMvuHUU0D2Sd1od9OTHmfgBoKVN3S6VWMLyFuebtRwHIwQmVYK+IuMoDOuzmLbW RVhqdfnCFgDoSvZmPZoFJrlTz9bURTFFN9OHPTB9aLtkAqvywcQYoljrOh+rdj/I L680osf5g7+1K/MP265ihPMdXuVkD4g5UaMICf8PT+DSWDg77i4fI6Pf77mDU82G ronucK6J9LPA4fD7o0Ufh4dA2swzgycSIJIJVYQT+/1ZZ+iL9Pl84YqDEnQPlqT/ QGS078jSVGWLiJ5JXTYHS6X1c2D2UJtKCCfP8kJk/dKDtwcAPcRbrvvh8dBXIC35 vy/3lR2upLnaRJPM4x7bCdilPCDOpSsMq+p/UTjB0U17LGrcU4MX5CnXfaMq5ZGi u+QuaGhyR/9tlc/Ft9JolSNtmOV9H4w+460gBejle/iPi9R1tsE= =bql1 -----END PGP SIGNATURE-----

Trust: 1.8

sources: NVD: CVE-2020-27929 // JVNDB: JVNDB-2020-014254 // VULHUB: VHN-372040 // PACKETSTORM: 159960

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:ltversion:12.4.9

Trust: 1.0

vendor:アップルmodel:iosscope:ltversion:(ipad mini 3)

Trust: 0.8

vendor:アップルmodel:iosscope:ltversion:(iphone 6 plus)

Trust: 0.8

vendor:アップルmodel:iosscope:ltversion:(ipod touch no. 6 generation )

Trust: 0.8

vendor:アップルmodel:iosscope:ltversion:(ipad mini 2)

Trust: 0.8

vendor:アップルmodel:iosscope:ltversion:(ipad air)

Trust: 0.8

vendor:アップルmodel:iosscope:eqversion: -

Trust: 0.8

vendor:アップルmodel:iosscope:ltversion:(iphone 6)

Trust: 0.8

vendor:アップルmodel:iosscope:ltversion:(iphone 5s)

Trust: 0.8

vendor:アップルmodel:iosscope:eqversion:12.4.9

Trust: 0.8

sources: JVNDB: JVNDB-2020-014254 // NVD: CVE-2020-27929

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-27929
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-27929
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202011-571
value: MEDIUM

Trust: 0.6

VULHUB: VHN-372040
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-27929
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-372040
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-27929
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-27929
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-372040 // JVNDB: JVNDB-2020-014254 // CNNVD: CNNVD-202011-571 // NVD: CVE-2020-27929

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:Other (CWE-Other) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-014254 // NVD: CVE-2020-27929

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202011-571

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202011-571

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-372040

PATCH

title:HT211940 Apple  Security updateurl:https://support.apple.com/en-us/HT211940

Trust: 0.8

title:Apple iOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=136250

Trust: 0.6

sources: JVNDB: JVNDB-2020-014254 // CNNVD: CNNVD-202011-571

EXTERNAL IDS

db:NVDid:CVE-2020-27929

Trust: 2.6

db:PACKETSTORMid:159960

Trust: 0.8

db:JVNid:JVNVU99462952

Trust: 0.8

db:JVNDBid:JVNDB-2020-014254

Trust: 0.8

db:AUSCERTid:ESB-2020.3910

Trust: 0.6

db:CNNVDid:CNNVD-202011-571

Trust: 0.6

db:VULHUBid:VHN-372040

Trust: 0.1

sources: VULHUB: VHN-372040 // JVNDB: JVNDB-2020-014254 // PACKETSTORM: 159960 // CNNVD: CNNVD-202011-571 // NVD: CVE-2020-27929

REFERENCES

url:https://support.apple.com/en-us/ht211940

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-27929

Trust: 1.5

url:https://jvn.jp/vu/jvnvu99462952/

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.3910/

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-ios-12-multiple-vulnerabilities-33840

Trust: 0.6

url:https://packetstormsecurity.com/files/159960/apple-security-advisory-2020-11-05-2.html

Trust: 0.6

url:https://support.apple.com/kb/ht211940

Trust: 0.6

url:https://support.apple.com/ht211940.

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27932

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27930

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27950

Trust: 0.1

sources: VULHUB: VHN-372040 // JVNDB: JVNDB-2020-014254 // PACKETSTORM: 159960 // CNNVD: CNNVD-202011-571 // NVD: CVE-2020-27929

CREDITS

Apple

Trust: 0.7

sources: PACKETSTORM: 159960 // CNNVD: CNNVD-202011-571

SOURCES

db:VULHUBid:VHN-372040
db:JVNDBid:JVNDB-2020-014254
db:PACKETSTORMid:159960
db:CNNVDid:CNNVD-202011-571
db:NVDid:CVE-2020-27929

LAST UPDATE DATE

2024-11-23T20:12:25.838000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-372040date:2020-12-09T00:00:00
db:JVNDBid:JVNDB-2020-014254date:2021-08-12T08:50:00
db:CNNVDid:CNNVD-202011-571date:2020-12-16T00:00:00
db:NVDid:CVE-2020-27929date:2024-11-21T05:22:04.307

SOURCES RELEASE DATE

db:VULHUBid:VHN-372040date:2020-12-08T00:00:00
db:JVNDBid:JVNDB-2020-014254date:2021-08-12T00:00:00
db:PACKETSTORMid:159960date:2020-11-09T18:30:52
db:CNNVDid:CNNVD-202011-571date:2020-11-05T00:00:00
db:NVDid:CVE-2020-27929date:2020-12-08T21:15:13.763