Vulnerability Name: | CVE-2020-3842 (CCN-175190) | ||||||||||||
Assigned: | 2019-12-18 | ||||||||||||
Published: | 2020-01-28 | ||||||||||||
Updated: | 2021-07-21 | ||||||||||||
Summary: | A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to execute arbitrary code with kernel privileges. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-3842 Source: XF Type: UNKNOWN apple-tvos-cve20203842-priv-esc(175190) Source: CCN Type: Packet Storm Security [02-20-2020] XNU ip6_notify_pmtu Remote mbuf Double-Free Source: CCN Type: Apple security document HT210920 About the security content of tvOS 13.3.1 Source: CCN Type: Apple security document HT210921 About the security content of watchOS 6.1.2 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/HT210918 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/HT210919 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/HT210920 Source: MISC Type: Release Notes, Vendor Advisory https://support.apple.com/HT210921 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |