Description
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.7, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution.
References (10)
Core 10
Core References
Vendor Advisory x_refsource_confirm
https://support.apple.com/kb/HT211843
Vendor Advisory x_refsource_confirm
https://support.apple.com/kb/HT211850
Vendor Advisory x_refsource_confirm
https://support.apple.com/kb/HT211844
Release Notes, Vendor Advisory x_refsource_misc
https://support.apple.com/en-us/HT211849
Vendor Advisory x_refsource_confirm
https://support.apple.com/kb/HT211952
Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Nov/19
Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Nov/20
Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Nov/22
Mailing List, Third Party Advisory mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Nov/21
Vendor Advisory x_refsource_confirm
https://support.apple.com/kb/HT211935
Scores
CVSS v3
7.8
EPSS
0.0027
EPSS Percentile
50.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-125
Status
published
Products (9)
apple/icloud
< 11.5
apple/ipados
< 14.0
apple/iphone_os
< 14.0
apple/itunes
< 12.10.9
apple/mac_os_x
10.13.6 (14 CPE variants)
apple/mac_os_x
10.14.6 (11 CPE variants)
apple/mac_os_x
10.13 - 10.13.6
apple/tvos
< 14.0
apple/watchos
< 7.0
Published
Oct 27, 2020
Tracked Since
Feb 18, 2026