Description
Multiple vulnerabilities were found in Apple iCloud. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A use after free vulnerability in WebKit can be exploiter remotely via special crafted webpage to execute arbitrary code.
- An out-of-bounds read vulnerability in ImageIO can be exploited remotely via special crafted image to execute arbitrary code.
- A security vulnerability in SQLite can be exploited remotely to cause denial of service.
- A use after free vulnerability in libxml2 can be exploited remotely via special crafted file to execute arbitrary code.
- An out-of-bounds write vulnerability in WebKit can be exploited renotely via special crafted web page to execute arbitrary code.
- A security bypass vulnerability in SQLite can be exploited via special crafted SQL query to cause denial of service.
- A memory corruption vulnerability in SQLite can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in SQLite can be exploited remotely to obtain sensitive information.
- A security vulnerability in Foundation can be exploited locally to security bypass restrictions and obtain sensitive information.
- A use after free vulnerability in libxml2 can be exploited remotely via special crafted web page to execute arbitrary code.
- A use after free vulnerability in WebKit can be exploited remotely via special crafted web page to execute arbitrary code.
- An integer overflow vulnerability in libxml2 can be exploited remotely to cause denial of service or execute arbitrary code.
- An out-of-bounds write vulnerability in ImageIO can be exploited via special crafted file to execute arbitrary code.
- A memory corruption vulnerability in CoreText can be exploited remotely via special crafted text file to execute arbitrary code.
Fiches de renseignement originales
Exploitation
Public exploits exist for this vulnerability.
Produits associés
Liste CVE
- CVE-2020-9951 critical
- CVE-2020-9961 critical
- CVE-2020-13435 high
- CVE-2020-13434 high
- CVE-2020-9981 critical
- CVE-2020-9983 critical
- CVE-2020-9947 critical
- CVE-2020-9999 critical
- CVE-2020-13631 high
- CVE-2020-13630 high
- CVE-2020-9849 high
- CVE-2020-10002 high
- CVE-2020-27917 critical
- CVE-2020-27918 critical
- CVE-2020-27911 critical
- CVE-2020-27912 critical
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !