Vulnerability Name: | CVE-2020-3829 (CCN-175195) | ||||||||||||
Assigned: | 2019-12-18 | ||||||||||||
Published: | 2020-01-28 | ||||||||||||
Updated: | 2020-03-02 | ||||||||||||
Summary: | An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to gain elevated privileges. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-125 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-3829 Source: XF Type: UNKNOWN apple-tvos-cve20203829-priv-esc(175195) Source: CCN Type: Packet Storm Security [02-13-2020] macOS / iOS launchd XPC Message Parsing Memory Corruption Source: CCN Type: Apple security document HT210920 About the security content of tvOS 13.3.1 Source: CCN Type: Apple security document HT210921 About the security content of watchOS 6.1.2 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/HT210918 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/HT210919 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/HT210920 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/HT210921 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |