SB2020121515 - Multiple vulnerabilities in Apple macOS



SB2020121515 - Multiple vulnerabilities in Apple macOS

Published: December 15, 2020 Updated: May 26, 2022

Security Bulletin ID SB2020121515
Severity
High
Patch available
YES
Number of vulnerabilities 73
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 37% Medium 25% Low 38%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 73 secuirty vulnerabilities.


1) Integer overflow (CVE-ID: CVE-2020-27911)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow when processing XML data in libxml2. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


2) Out-of-bounds write (CVE-ID: CVE-2020-27912)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing images within the ImageIO subsystem. A remote attacker can create a specially crafted image, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


3) Security features bypass (CVE-ID: CVE-2020-9974)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists within the OS kernel that allows a local user to run a specially crafted program and determine kernel memory layout. This vulnerability can be used to bypass implemented security restrictions and leverage exploitation of other vulnerabilities.


4) Buffer overflow (CVE-ID: CVE-2020-10016)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the OS kernel subsystem. A local user can run a specially crafted application, trigger memory corruption and escalate privileges on the system.


5) Use-after-free (CVE-ID: CVE-2020-27926)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error when processing untrusted input XML input in libxml2. A remote attacker can pass specially crafted data to the library, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


6) Untrusted search path (CVE-ID: CVE-2020-10010)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper path handling of libraries within the Logging subsystem. A local user can execute arbitrary code on the system with elevated privileges.


7) Out-of-bounds read (CVE-ID: CVE-2020-13524)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Model I/O subsystem when processing USD files. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


8) Race condition (CVE-ID: CVE-2020-10004)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a race condition within the Model I/O subsystem when processing files. A remote attacker can trick the victim to open a specially crafted file and crash the system or execute arbitrary code.


9) Use-after-free (CVE-ID: CVE-2020-15969)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error within the usersctp library. A remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


10) Out-of-bounds read (CVE-ID: CVE-2020-27910)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Audio subsystem when processing media files. A remote attacker can create a specially crafted media file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


11) Out-of-bounds write (CVE-ID: CVE-2020-27916)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within the Audio subsystem when processing media files. A remote attacker can create a specially crafted media file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


12) Out-of-bounds write (CVE-ID: CVE-2020-10017)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within the CoreAudio subsystem when processing media files. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


13) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-10002)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a logic issue within the Foundation subsystem. A local user can read otherwise restricted files on the system.


14) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-29621)

The vulnerability allows a local application to bypass implemented security restrictions.

The vulnerability exists due to incorrect permissions within the AppleMobileFileIntegrity component. A local application can bypass configured Privacy preferences.


15) Input validation error (CVE-ID: CVE-2020-27941)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input within the AppleGraphicsControl component. A local user can run a specially crafted program to execute arbitrary code on the system with kernel privileges.


16) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-27903)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions within App Store component. A local user can bypass security restrictions bypass and escalate privileges on the system.


17) Buffer overflow (CVE-ID: CVE-2020-27915)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the AMD component. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the target system with elevated privileges.


18) Buffer overflow (CVE-ID: CVE-2020-27914)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the AMD component. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the target system with elevated privileges.


19) Out-of-bounds read (CVE-ID: CVE-2020-9943)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Audio subsystem when processing media files. A remote attacker can create a specially crafted media file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


20) Out-of-bounds read (CVE-ID: CVE-2020-9944)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the Audio subsystem when processing media files. A remote attacker can create a specially crafted media file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


21) Out-of-bounds read (CVE-ID: CVE-2020-9956)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the FontParser component. A remote attacker can create a specially crafted image file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


22) Out-of-bounds write (CVE-ID: CVE-2020-27952)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing image files within the FontParser component. A remote attacker can create a specially crafted image file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


23) Buffer overflow (CVE-ID: CVE-2020-9962)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing image files in FontParser component. A remote attacker can create a specially crafted image, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


24) State Issues (CVE-ID: CVE-2020-27922)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a logic issue, related to state management when processing font files. A remote attacker can create a specially crafted document, trick the victim into opening it and execute arbitrary code on the system.


25) Out-of-bounds read (CVE-ID: CVE-2020-27908)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the CoreAudio component when processing MP4 files. A remote attacker can create a specially crafted audio file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


26) Out-of-bounds read (CVE-ID: CVE-2020-9960)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the CoreAudio component. A remote attacker can create a specially crafted audio file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


27) Integer overflow (CVE-ID: CVE-2020-27906)

The vulnerability allows an attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow within Bluetooth component. An attacker can send  specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


28) Out-of-bounds write (CVE-ID: CVE-2020-29612)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Graphics drivers within the AppleIntelKBLGraphics kex. A local user can run a specially crafted program to trigger an out-of-bounds write error and execute arbitrary code on the target system with kernel privileges.



29) Buffer overflow (CVE-ID: CVE-2020-27947)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in process_token_AVCDecode within Graphics drivers. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code on the target system with kernel privileges.



30) Buffer overflow (CVE-ID: CVE-2020-27931)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing fonts within the FontParser component. A remote attacker can create a specially crafted document with a malicious font, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


31) Out-of-bounds write (CVE-ID: CVE-2020-27897)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the handling of numerous IOCTLs in the AppleIntelKBLGraphics kext in Intel Graphics Driver. A local user can run a specially crafted program to  trigger out-of-bounds write and execute arbitrary code on the target system.


32) Out-of-bounds read (CVE-ID: CVE-2020-29610)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the AudioToolboxCore module. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


33) Security restrictions bypass (CVE-ID: CVE-2020-9978)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due within the HomeKit component when processing settings propagation. A remote attacker on the local network can alter application state.


34) Out-of-bounds write (CVE-ID: CVE-2020-27919)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error during image processing. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


35) Buffer overflow (CVE-ID: CVE-2020-29616)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


36) Out-of-bounds read (CVE-ID: CVE-2020-27924)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and compromise the affected system.


37) Out-of-bounds write (CVE-ID: CVE-2020-27923)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


38) Out-of-bounds write (CVE-ID: CVE-2020-10015)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Intel Graphics Driver. A local user can run a specially crafted program to trigger out-of-bounds write error and execute arbitrary code on the system with elevated privileges.


39) Out-of-bounds write (CVE-ID: CVE-2020-27907)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Intel Graphics Driver. A local user can run a specially crafted program to trigger out-of-bounds write error and execute arbitrary code on the system with elevated privileges.


40) Security restrictions bypass (CVE-ID: CVE-2020-29620)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions within the OS kernel subsystem, related to entitlements. A local user can bypass implemented security restrictions and escalate privileges on the system.


41) Security restrictions bypass (CVE-ID: CVE-2020-27949)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions within the OS Kernel subsystem. A local user can run a specially crafted program to perform unexpected changes in memory belonging to processes traced by DTrace.


42) Race condition (CVE-ID: CVE-2020-27921)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a race condition within the OS Kernel subsystem. A local user can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


43) Use-after-free (CVE-ID: CVE-2020-9975)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the OS Kernel subsystem. A local user can run a specially crafted program to trigger a use-after-free error and execute arbitrary code with kernel privileges.



44) Input validation error (CVE-ID: CVE-2020-9967)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input within the OS Kernel subsystem. A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.


45) Integer overflow (CVE-ID: CVE-2020-27920)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to integer overflow when processing XML data in libxml2. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


46) Files or Directories Accessible to External Parties (CVE-ID: CVE-2020-10014)

The vulnerability allows a local user to break out of its sandbox.

The vulnerability exists due to incorrect parsing of directory paths. A malicious application can create a specially crafted directory name and break out of its sandbox.


47) Security restrictions bypass (CVE-ID: CVE-2020-27901)

The vulnerability allows a local application to bypass sandbox restrictions.

The vulnerability exists due to a logic error within NSRemoteView. A local application can bypass sandbox restrictions.


48) Information disclosure (CVE-ID: CVE-2020-10007)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to state management issues in Power Management subsystem. A local user can determine kernel memory layout.


49) Cross-site scripting (CVE-ID: CVE-2020-10012)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data within the Quick Look feature. A remote attacker can execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


50) Files or Directories Accessible to External Parties (CVE-ID: CVE-2020-27896)

The vulnerability allows a remote attacker to modify files on the system.

The vulnerability exists due to improper input validation in Ruby implementation on macOS. A remote attacker can modify files on the system.


51) Security restrictons bypass (CVE-ID: CVE-2020-10009)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a logic issue in System Preferences subsystem. A local application can bypass sandbox restrictions.


52) Resource management error (CVE-ID: CVE-2020-27898)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the Wi-Fi subsystem. A remote attacker can send specially crafted data to the application and perform a denial of service (DoS) attack.


53) Out-of-bounds read (CVE-ID: CVE-2020-27936)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within AMD subsystem. A local user can trigger out-of-bounds read error and read contents of memory on the system.


54) Buffer overflow (CVE-ID: CVE-2020-29624)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing font files within FontParser. A remote attacker can create a specially crafted document or web page, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


55) Buffer overflow (CVE-ID: CVE-2020-27944)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing fonts within the FontParser component. A remote attacker can create a document or web page with a specially crafted font, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


56) Buffer overflow (CVE-ID: CVE-2020-27943)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing fonts within the FontParser component. A remote attacker can create a document or web page with a specially crafted font, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


57) Input validation error (CVE-ID: CVE-2020-27939)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input in ImageIO. A remote attacker can trick the victim to open a specially crafted image and execute arbitrary code on the system.


58) Input validation error (CVE-ID: CVE-2020-29625)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to insufficient validation of user-supplied input in ImageIO. A remote attacker can trick the victim to open a specially crafted image and execute arbitrary code on the system.


59) Out-of-bounds read (CVE-ID: CVE-2020-29615)

The vulnerability allows a remote attacker to gain access to potentially sensitive information or perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in ImageIO. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system or crash the application.


60) Out-of-bounds write (CVE-ID: CVE-2020-13520)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing USD file in Model I/O subsystem. A remote attacker can create a specially crafted USD file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


61) Buffer overflow (CVE-ID: CVE-2020-9972)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing USD files in Model I/O subsystem. A remote attacker can create a specially crafted USD, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


62) Out-of-bounds read (CVE-ID: CVE-2020-10001)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the ippReadIO() function in CUPS. A remote attacker can send specially crafted data to the affected application, trigger an out-of-bounds read error and read contents of memory on the system or crash the service.


63) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-27938)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions within the Power Management component in macOS. A local application can elevate privileges on the system.



64) Out-of-bounds read (CVE-ID: CVE-2020-27946)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition within the FontParser component when processing fonts. A remote attacker can trick the victim into opening a file or web page that contains a specially crafted font, trigger out-of-bounds read error and read contents of memory on the system.


65) Out-of-bounds write (CVE-ID: CVE-2020-27948)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing media files within the CoreAudio component. A remote attacker can create a specially crafted media file, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.


66) Out-of-bounds read (CVE-ID: CVE-2020-29608)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition when processing font files within the FontParser component in macOS. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system.


67) Out-of-bounds write (CVE-ID: CVE-2020-29611)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input within the ImageIO component. A remote attacker can create a specially crafted image file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.


68) Heap-based buffer overflow (CVE-ID: CVE-2020-29614)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the Model I/O component in macOS. A remote attacker can pass specially crafted file, trick the victim into opening it, trigger heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


69) Out-of-bounds read (CVE-ID: CVE-2020-29617)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a heap corruption within the ImageIO component when processing images. A remote attacker can create a specially crafted image, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.

70) Out-of-bounds read (CVE-ID: CVE-2020-29618)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a heap corruption within the ImageIO component when processing images. A remote attacker can create a specially crafted image, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.

Reportedly this vulnerability can lead to remote code execution.


71) Out-of-bounds read (CVE-ID: CVE-2020-29619)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a heap corruption within the ImageIO component when processing images. A remote attacker can create a specially crafted image, trick the victim into opening it, trigger out-of-bounds read error and read contents of memory on the system or perform a denial of service (DoS) attack.

72) Incomplete cleanup (CVE-ID: CVE-2020-29623)

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due to software fails to to fully delete browsing history under certain circumstances via the “Clear History and Website Data” option. An attacker with access to the system can obtain browsing data after cleanup.


73) Improper Authentication (CVE-ID: CVE-2020-29633)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests in Login Window component in macOS. A remote attacker on the local network can bypass authentication process and gain unauthorized access to the application.


Remediation

Install update from vendor's website.

References