Vulnerability Name: | CVE-2020-9967 (CCN-193109) | ||||||||||||
Assigned: | 2020-12-14 | ||||||||||||
Published: | 2020-12-14 | ||||||||||||
Updated: | 2022-06-04 | ||||||||||||
Summary: | Multiple memory corruption issues were addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, tvOS 14.0, macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, watchOS 7.0, iOS 14.0 and iPadOS 14.0. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory. | ||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-9967 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/163501/XNU-Network-Stack-Kernel-Heap-Overflow.html Source: XF Type: UNKNOWN apple-macos-cve20209967-code-exec(193109) Source: CCN Type: Packet Storm Security [07-14-2021] XNU Network Stack Kernel Heap Overflow Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT211843 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT211844 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT211850 Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT211931 Source: CCN Type: Apple security document HT212011 About the security content of macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave Source: MISC Type: Vendor Advisory https://support.apple.com/en-us/HT212011 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |