ID

VAR-202006-1623


CVE

CVE-2020-9827


TITLE

plural Apple Service operation interruption in the product (DoS) Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2020-006221

DESCRIPTION

A denial of service issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. A remote attacker may be able to cause a denial of service. plural Apple The product has a flaw in input verification, which interferes with service operation. (DoS) Vulnerability exists.Service operation disrupted by a remote attacker (DoS) It may be put into a state. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. Apple iPadOS is an operating system for iPad tablets. Apple macOS Catalina is a dedicated operating system developed for Mac computers. Accounts is one of the user account components. A security vulnerability exists in the Accounts component of several Apple products. The following products and versions are affected: Apple macOS Catalina prior to 10.15.5; iOS prior to 13.5; iPadOS prior to 13.5; tvOS prior to 13.4.5; watchOS prior to 6.2.5. Alternatively, you may manually check for software updates by selecting "Settings -> System -> Software Update -> Update Software." To check the current version of software, select "Settings -> General -> About." -----BEGIN PGP SIGNATURE----- Version: BCPG v1.64 iQIcBAEDCAAGBQJezV7eAAoJEAc+Lhnt8tDNGUEQAIqcHvrOcVu90wELj4q9d2Z/ LwyOmEKZu0s5QO5d2XuusXQig7etS+hQg4y4IEBc6+FbeHQ6geksjn4CEs0y1hs2 cIQHtXqOes5QRZx4joMGqC6rsS2U+DoSxtsxyKDrzhWCBJdz18JXG/5AdLQn9Zo4 QvUVVwNX61QiFGlUd5lL9QZWrh+FBxgilex7H9YpCVSzcTN5xcbe48zVjhpU/UFn KKKRK15aTzGqhmJ1zhvYUVLal4tfWV52QzWNbUW2UlPGxFORNpYKXCmQILk8eQGj FqIIjGrVcGYPnCDKbMfh24rEilYMzhDrQNg06uokgilPAUXC937lI88+G56Ayl9n ABOK/i04ni1FrmGkwRf/VEW6WV7k3bpXi5UTUZZCplfk19PoH8MIk1wUZ8AzActr lxK5DeHPKAG5Pl3dzkqKT8lQ/9aSozken7yQNz7AIo5Ib1ik88er4uu/SjV5CRka e0t8tkoL8MLIpMqUUpt7j+HgqB/R8VBQ6lBK0Jds2NI84XWXRTHF7UeeVo/BYoTj gdUqhL1B3vdIizxSemmbx70wVoHLU//JONHLJNE6dfGdNWeKHcqKfzZPbXo/4Hq/ ZDNj/cDOJTmChYqvG/Qi7AHlKACWpYMNnRsa6hMt99z24hdvPg2LP4ANf7Gi6Sq6 CnECyJL8Va3625vOipPF =ceKY -----END PGP SIGNATURE----- . CVE-2020-9827: Jannik Lorenz of SEEMOO @ TU Darmstadt AppleMobileFileIntegrity Available for: Apple Watch Series 1 and later Impact: An application may be able to use arbitrary entitlements Description: This issue was addressed with improved checks. CVE-2020-9842: Linus Henze (pinauten.de) Audio Available for: Apple Watch Series 1 and later Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9815: Yu Zhou (@yuzhou6666) working with Trend Micro Zero Day Initiative Audio Available for: Apple Watch Series 1 and later Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9791: Yu Zhou (@yuzhou6666) working with Trend Micro Zero Day Initiative CoreText Available for: Apple Watch Series 1 and later Impact: Processing a maliciously crafted text message may lead to application denial of service Description: A validation issue was addressed with improved input sanitization. CVE-2020-9829: Aaron Perris (@aaronp613), an anonymous researcher, an anonymous researcher, Carlos S Tech, Sam Menzies of Sam’s Lounge, Sufiyan Gouri of Lovely Professional University, India, Suleman Hasan Rathor of Arabic-Classroom.com FontParser Available for: Apple Watch Series 1 and later Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9816: Peter Nguyen Vu Hoang of STAR Labs working with Trend Micro Zero Day Initiative ImageIO Available for: Apple Watch Series 1 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-3878: Samuel Groß of Google Project Zero ImageIO Available for: Apple Watch Series 1 and later Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9789: Wenchao Li of VARAS@IIE CVE-2020-9790: Xingwei Lin of Ant-financial Light-Year Security Lab Kernel Available for: Apple Watch Series 1 and later Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved state management. CVE-2020-9821: Xinru Chi and Tielei Wang of Pangu Lab Kernel Available for: Apple Watch Series 1 and later Impact: A malicious application may be able to determine another application's memory layout Description: An information disclosure issue was addressed by removing the vulnerable code. CVE-2020-9797: an anonymous researcher Kernel Available for: Apple Watch Series 1 and later Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: An integer overflow was addressed through improved input validation. CVE-2020-9852: Tao Huang and Tielei Wang of Pangu Lab Kernel Available for: Apple Watch Series 1 and later Impact: An application may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2020-9795: Zhuo Liang of Qihoo 360 Vulcan Team Kernel Available for: Apple Watch Series 1 and later Impact: An application may be able to cause unexpected system termination or write kernel memory Description: A memory corruption issue was addressed with improved state management. CVE-2020-9808: Xinru Chi and Tielei Wang of Pangu Lab Kernel Available for: Apple Watch Series 1 and later Impact: A local user may be able to read kernel memory Description: An information disclosure issue was addressed with improved state management. CVE-2020-9811: Tielei Wang of Pangu Lab CVE-2020-9812: Derrek (@derrekr6) Kernel Available for: Apple Watch Series 1 and later Impact: A malicious application may be able to execute arbitrary code with kernel privileges Description: A logic issue existed resulting in memory corruption. CVE-2020-9813: Xinru Chi of Pangu Lab CVE-2020-9814: Xinru Chi and Tielei Wang of Pangu Lab Kernel Available for: Apple Watch Series 1 and later Impact: A malicious application may be able to determine kernel memory layout Description: An information disclosure issue was addressed with improved state management. CVE-2020-9809: Benjamin Randazzo (@____benjamin) Mail Available for: Apple Watch Series 1 and later Impact: Processing a maliciously crafted mail message may lead to heap corruption Description: A memory consumption issue was addressed with improved memory handling. CVE-2020-9819: ZecOps.com Mail Available for: Apple Watch Series 1 and later Impact: Processing a maliciously crafted mail message may lead to unexpected memory modification or application termination Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9818: ZecOps.com Python Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to cause arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2020-9793 SQLite Available for: Apple Watch Series 1 and later Impact: A malicious application may cause a denial of service or potentially disclose memory contents Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9794 System Preferences Available for: Apple Watch Series 1 and later Impact: An application may be able to gain elevated privileges Description: A race condition was addressed with improved state handling. CVE-2020-9839: @jinmo123, @setuid0x0_, and @insu_yun_en of @SSLab_Gatech working with Trend Micro’s Zero Day Initiative WebKit Available for: Apple Watch Series 1 and later Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved restrictions. CVE-2020-9805: an anonymous researcher WebKit Available for: Apple Watch Series 1 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A logic issue was addressed with improved restrictions. CVE-2020-9802: Samuel Groß of Google Project Zero WebKit Available for: Apple Watch Series 1 and later Impact: A remote attacker may be able to cause arbitrary code execution Description: A logic issue was addressed with improved restrictions. CVE-2020-9850: @jinmo123, @setuid0x0_, and @insu_yun_en of @SSLab_Gatech working with Trend Micro’s Zero Day Initiative WebKit Available for: Apple Watch Series 1 and later Impact: Processing maliciously crafted web content may lead to a cross site scripting attack Description: An input validation issue was addressed with improved input validation. CVE-2020-9843: Ryan Pickren (ryanpickren.com) WebKit Available for: Apple Watch Series 1 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved validation. CVE-2020-9803: Wen Xu of SSLab at Georgia Tech WebKit Available for: Apple Watch Series 1 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2020-9806: Wen Xu of SSLab at Georgia Tech CVE-2020-9807: Wen Xu of SSLab at Georgia Tech WebKit Available for: Apple Watch Series 1 and later Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed with improved memory handling. CVE-2020-9800: Brendan Draper (@6r3nd4n) working with Trend Micro Zero Day Initiative WebRTC Available for: Apple Watch Series 1 and later Impact: Processing maliciously crafted web content may result in the disclosure of process memory Description: An access issue was addressed with improved memory management. CVE-2019-20503: Natalie Silvanovich of Google Project Zero zsh Available for: Apple Watch Series 1 and later Impact: A local attacker may be able to elevate their privileges Description: An authorization issue was addressed with improved state management. CVE-2019-20044: Sam Foxman Additional recognition CoreText We would like to acknowledge Jiska Classen (@naehrdine) and Dennis Heinze (@ttdennis) of Secure Mobile Networking Lab for their assistance. ImageIO We would like to acknowledge Lei Sun for their assistance. IOHIDFamily We would like to acknowledge Andy Davis of NCC Group for their assistance. Kernel We would like to acknowledge Brandon Azad of Google Project Zero for their assistance. Safari We would like to acknowledge Luke Walker of Manchester Metropolitan University for their assistance. WebKit We would like to acknowledge Aidan Dunlap of UT Austin for their assistance. Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNATURE----- Version: BCPG v1.64 iQIcBAEDCAAGBQJezV7iAAoJEAc+Lhnt8tDNOiEP/10y27pTK/QbuSGW7HnZoJjg f2sHKU0JBCz7BjdgZHl6g+glsYPTojGGlIEa/r0ID9X74I41YS3cGvzmTQXcSdXV Xbs98UPjabCZOMiTW/LBxx25I78UptqhMhisrXnNXfu+lAYOxmJVQ0vbN9jd9za9 oKw1ydIi4aGfwPg8KOtMbxzE8wb8+SsRlHmXGh4qSmJ0o5BIvumdPMQRInM5Sdhp d/XWrgc7SPKervyfgvlylWE3KteDDSkk8d42wN4444pLQkVrKnaxGKHjWz01jcMF 1uB9ExsQbINGeR78wu8hD1wZke735shCwSyHHlSVf0iT/Ji3Zafy5dN79lMH5M8t x6ZmvDaPtNXGTaH41oTqsmyVoauy8ArWVMAuyi/ZdM6tM4J+7nEEAhrzvVOJ/0A2 nTdGZBDUeUmDLpcJwGw4h8MCYNqscHYNAPUJ2sLfyQhT6lC71yvJeKENwsK77hTC ZP+TFZbnbq7kETD/JknhGb8eC4DQ71NmlRNWpfKBId5bvXLRqiP/WHtwQk6XYCBN YNEOAUltQd4vKAI1ozjMh+RTI0EHNxTZCWJPawEkk2WhAytz+js+nJB4R9kp6N+k GghA5YOwLr/RveIzgm3fWEXOCR7b+7qxic+DPPULycnpdhDglbBWr4p8giQufnS2 2yHIY1iRg2jjw5hArbVE =9PNQ -----END PGP SIGNATURE-----

Trust: 1.89

sources: NVD: CVE-2020-9827 // JVNDB: JVNDB-2020-006221 // VULHUB: VHN-187952 // PACKETSTORM: 157883 // PACKETSTORM: 157879

AFFECTED PRODUCTS

vendor:applemodel:tvosscope:ltversion:13.4.5

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:13.5

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:13.5

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:6.2.5

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.5

Trust: 1.0

vendor:applemodel:tvosscope:eqversion:13.4.5 未満 (apple tv 4k)

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.5.1 未満 (ipad air 2 以降)

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.5.1 未満 (ipad mini 4 以降)

Trust: 0.8

vendor:applemodel:watchosscope:eqversion:6.2.5 未満 (apple watch series 1 以降)

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:13.4.5 未満 (apple tv hd)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15.4

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13.5.1 未満 (iphone 6s 以降)

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13.5.1 未満 (ipod touch 第 7 世代)

Trust: 0.8

sources: JVNDB: JVNDB-2020-006221 // NVD: CVE-2020-9827

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9827
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-006221
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202005-1329
value: HIGH

Trust: 0.6

VULHUB: VHN-187952
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-9827
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-006221
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-187952
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-9827
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-006221
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-187952 // JVNDB: JVNDB-2020-006221 // CNNVD: CNNVD-202005-1329 // NVD: CVE-2020-9827

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2020-9827

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202005-1329

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202005-1329

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-006221

PATCH

title:HT211168url:https://support.apple.com/en-us/HT211168

Trust: 0.8

title:HT211170url:https://support.apple.com/en-us/HT211170

Trust: 0.8

title:HT211171url:https://support.apple.com/en-us/HT211171

Trust: 0.8

title:HT211175url:https://support.apple.com/en-us/HT211175

Trust: 0.8

title:HT211170url:https://support.apple.com/ja-jp/HT211170

Trust: 0.8

title:HT211171url:https://support.apple.com/ja-jp/HT211171

Trust: 0.8

title:HT211175url:https://support.apple.com/ja-jp/HT211175

Trust: 0.8

title:HT211168url:https://support.apple.com/ja-jp/HT211168

Trust: 0.8

title:Multiple Apple product Accounts Fixes for component security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=119895

Trust: 0.6

sources: JVNDB: JVNDB-2020-006221 // CNNVD: CNNVD-202005-1329

EXTERNAL IDS

db:NVDid:CVE-2020-9827

Trust: 2.7

db:JVNid:JVNVU98042162

Trust: 0.8

db:JVNDBid:JVNDB-2020-006221

Trust: 0.8

db:CNNVDid:CNNVD-202005-1329

Trust: 0.7

db:PACKETSTORMid:157883

Trust: 0.7

db:NSFOCUSid:48615

Trust: 0.6

db:AUSCERTid:ESB-2020.1861

Trust: 0.6

db:CNVDid:CNVD-2020-30752

Trust: 0.1

db:VULHUBid:VHN-187952

Trust: 0.1

db:PACKETSTORMid:157879

Trust: 0.1

sources: VULHUB: VHN-187952 // JVNDB: JVNDB-2020-006221 // PACKETSTORM: 157883 // PACKETSTORM: 157879 // CNNVD: CNNVD-202005-1329 // NVD: CVE-2020-9827

REFERENCES

url:https://support.apple.com/ht211168

Trust: 1.7

url:https://support.apple.com/ht211170

Trust: 1.7

url:https://support.apple.com/ht211171

Trust: 1.7

url:https://support.apple.com/ht211175

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-9827

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9827

Trust: 0.8

url:http://jvn.jp/vu/jvnvu98042162/index.html

Trust: 0.8

url:https://support.apple.com/kb/ht211168

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1861/

Trust: 0.6

url:https://support.apple.com/en-us/ht211170

Trust: 0.6

url:http://www.nsfocus.net/vulndb/48615

Trust: 0.6

url:https://vigilance.fr/vulnerability/apple-macos-multiple-vulnerabilities-32343

Trust: 0.6

url:https://support.apple.com/en-us/ht211168

Trust: 0.6

url:https://support.apple.com/kb/ht211170

Trust: 0.6

url:https://packetstormsecurity.com/files/157883/apple-security-advisory-2020-05-26-4.html

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-9807

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9809

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9806

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9813

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9795

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9814

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9811

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9802

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9797

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9791

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9808

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-20503

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9790

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9821

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9800

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9816

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9789

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-20044

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-3878

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9805

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9803

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9815

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9793

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9794

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9812

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-9829

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9837

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9819

Trust: 0.1

url:https://support.apple.com/kb/ht204641

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9818

Trust: 0.1

sources: VULHUB: VHN-187952 // JVNDB: JVNDB-2020-006221 // PACKETSTORM: 157883 // PACKETSTORM: 157879 // CNNVD: CNNVD-202005-1329 // NVD: CVE-2020-9827

CREDITS

Apple

Trust: 0.8

sources: PACKETSTORM: 157883 // PACKETSTORM: 157879 // CNNVD: CNNVD-202005-1329

SOURCES

db:VULHUBid:VHN-187952
db:JVNDBid:JVNDB-2020-006221
db:PACKETSTORMid:157883
db:PACKETSTORMid:157879
db:CNNVDid:CNNVD-202005-1329
db:NVDid:CVE-2020-9827

LAST UPDATE DATE

2024-11-23T20:20:24.790000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-187952date:2023-01-09T00:00:00
db:JVNDBid:JVNDB-2020-006221date:2020-07-03T00:00:00
db:CNNVDid:CNNVD-202005-1329date:2021-11-03T00:00:00
db:NVDid:CVE-2020-9827date:2024-11-21T05:41:21.487

SOURCES RELEASE DATE

db:VULHUBid:VHN-187952date:2020-06-09T00:00:00
db:JVNDBid:JVNDB-2020-006221date:2020-07-03T00:00:00
db:PACKETSTORMid:157883date:2020-05-29T19:07:47
db:PACKETSTORMid:157879date:2020-05-29T19:05:25
db:CNNVDid:CNNVD-202005-1329date:2020-05-26T00:00:00
db:NVDid:CVE-2020-9827date:2020-06-09T17:15:13.940