Kaspersky ID:
KLA12017
Date de la détection:
12/02/2020
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Apple iCloud. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A use after free vulnerability in WebKit can be exploiter remotely via special crafted webpage to execute arbitrary code.
  2. An out-of-bounds read vulnerability in ImageIO can be exploited remotely via special crafted image to execute arbitrary code.
  3. A security vulnerability in SQLite can be exploited remotely to cause denial of service.
  4. A use after free vulnerability in libxml2 can be exploited remotely via special crafted file to execute arbitrary code.
  5. An out-of-bounds write vulnerability in WebKit can be exploited renotely via special crafted web page to execute arbitrary code.
  6. A security bypass vulnerability in SQLite can be exploited via special crafted SQL query to cause denial of service.
  7. A memory corruption vulnerability in SQLite can be exploited remotely to execute arbitrary code.
  8. An information disclosure vulnerability in SQLite can be exploited remotely to obtain sensitive information.
  9. A security vulnerability in Foundation can be exploited locally to security bypass restrictions and obtain sensitive information.
  10. A use after free vulnerability in libxml2 can be exploited remotely via special crafted web page to execute arbitrary code.
  11. A use after free vulnerability in WebKit can be exploited remotely via special crafted web page to execute arbitrary code.
  12. An integer overflow vulnerability in libxml2 can be exploited remotely to cause denial of service or execute arbitrary code.
  13. An out-of-bounds write vulnerability in ImageIO can be exploited via special crafted file to execute arbitrary code.
  14. A memory corruption vulnerability in CoreText can be exploited remotely via special crafted text file to execute arbitrary code.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Produits associés

Liste CVE

  • CVE-2020-9951
    critical
  • CVE-2020-9961
    critical
  • CVE-2020-13435
    high
  • CVE-2020-13434
    high
  • CVE-2020-9981
    critical
  • CVE-2020-9983
    critical
  • CVE-2020-9947
    critical
  • CVE-2020-9999
    critical
  • CVE-2020-13631
    high
  • CVE-2020-13630
    high
  • CVE-2020-9849
    high
  • CVE-2020-10002
    high
  • CVE-2020-27917
    critical
  • CVE-2020-27918
    critical
  • CVE-2020-27911
    critical
  • CVE-2020-27912
    critical

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.