Kaspersky ID:
KLA11705
Date de la détection:
03/25/2020
Mis à jour:
01/22/2024

Description

Multiple vulnerabilities were found in Apple iCloud. Malicious users can exploit these vulnerabilities to bypass security restrictions, cause denial of service, execute arbitrary code, perform cross-site scripting attack, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A logic vulnerability in WebKit can be exploited to bypass security restrictions.
  2. Buffer overflow vulnerability in libxml2 can be exploited to cause denial of service.
  3. Memory corruption vulnerability in WebKit can be exploited via a specially crafted webpage to execute arbitrary code.
  4. A type confusion vulnerability in WebKit can be exploited via a specially crafted webpage to execute arbitrary code.
  5. An input validation vulnerability in WebKit can be exploited via specially crafted webpage to perform cross-site scripting attacks.
  6. A race condition vulnerability in WebKit can be exploited to obtain sensitive information.
  7. A type confusion vulnerability in WebKit can be exploited remotely to execute arbitrary code.
  8. Use after free vulnerability in WebKit can be exploited via a specially crafted webpage to execute arbitrary code.
  9. A memory consumption vulnerability in WebKit can be exploited remotely to execute arbitrary code.
  10. A logic vulnerability in WebKit Loading Page can be exploited to bypass security restrictions.

Fiches de renseignement originales

Exploitation

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2020-9783
    high
  • CVE-2020-3909
    critical
  • CVE-2020-3910
    critical
  • CVE-2020-3887
    warning
  • CVE-2020-3895
    critical
  • CVE-2020-3894
    warning
  • CVE-2020-3901
    high
  • CVE-2020-3899
    critical
  • CVE-2020-3900
    high
  • CVE-2020-3897
    critical
  • CVE-2020-3902
    warning
  • CVE-2020-3885
    warning
  • CVE-2020-3911
    critical

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.