| Vulnerability Name: | CVE-2020-29624 (CCN-196230) | ||||||||||||
| Assigned: | 2020-12-22 | ||||||||||||
| Published: | 2020-12-22 | ||||||||||||
| Updated: | 2021-04-07 | ||||||||||||
| Summary: | A memory corruption issue existed in the processing of font files. This issue was addressed with improved input validation. This issue is fixed in watchOS 7.2, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, iOS 14.3 and iPadOS 14.3, tvOS 14.3. Processing a maliciously crafted font file may lead to arbitrary code execution. | ||||||||||||
| CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||
| Vulnerability Type: | CWE-119 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2020-29624 Source: XF Type: UNKNOWN apple-macos-cve202029624-code-exec(196230) Source: CCN Type: Packet Storm Security [02-05-2021] Apple CoreText libFontParser.dylib Stack Corruption Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212003 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212005 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212009 Source: CCN Type: Apple security document HT212011 About the security content of macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212011 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||