Vulnerability Name: | CVE-2020-27943 (CCN-193044) | ||||||||||||
Assigned: | 2020-12-14 | ||||||||||||
Published: | 2020-12-14 | ||||||||||||
Updated: | 2021-04-07 | ||||||||||||
Summary: | A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in tvOS 14.3, iOS 14.3 and iPadOS 14.3, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.2. Processing a maliciously crafted font file may lead to arbitrary code execution. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-27943 Source: XF Type: UNKNOWN apple-watchos-cve202027943-code-exec(193044) Source: CCN Type: Packet Storm Security [02-05-2021] Apple CoreText libType1Scaler.dylib Buffer Overflow Source: CCN Type: Apple security document HT212003 About the security content of iOS 14.3 and iPadOS 14.3 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212003 Source: CCN Type: Apple security document HT212005 About the security content of tvOS 14.3 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212005 Source: CCN Type: Apple security document HT212009 About the security content of watchOS 7.2 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212009 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212011 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |