ID

VAR-202010-1277


CVE

CVE-2020-9875


TITLE

plural Apple Integer overflow vulnerability in product

Trust: 0.8

sources: JVNDB: JVNDB-2020-010567

DESCRIPTION

An integer overflow was addressed through improved input validation. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. plural Apple The product is vulnerable to integer overflow due to flawed input validation.Arbitrary code can be executed by processing maliciously created images. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apple macOS. Interaction with the ImageIO library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.The specific flaw exists within the ImageIO framework. An attacker can leverage this vulnerability to execute code in the context of the current process. Apple iTunes for Windows is a media player application program based on Windows platform of Apple (Apple). ImageIO is one of the components that reads and writes image data. A security vulnerability exists in the ImageIO component of Windows-based Apple iTunes versions prior to 12.10.8

Trust: 2.43

sources: NVD: CVE-2020-9875 // JVNDB: JVNDB-2020-010567 // ZDI: ZDI-20-938 // VULHUB: VHN-188000 // VULMON: CVE-2020-9875

AFFECTED PRODUCTS

vendor:applemodel:icloudscope:ltversion:11.3

Trust: 1.0

vendor:applemodel:icloudscope:ltversion:7.20

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.6

Trust: 1.0

vendor:applemodel:itunesscope:ltversion:12.10.8

Trust: 1.0

vendor:applemodel:icloudscope:gteversion:10.0

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:13.4.8

Trust: 1.0

vendor:applemodel:watchosscope:ltversion:6.2.8

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:13.6

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:13.6

Trust: 1.0

vendor:applemodel:icloudscope:eqversion:7.20 未満 (windows 7 以降)

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13.6 未満 (iphone 6s 以降)

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.13.6

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.15.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.14.6

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.6 未満 (ipad mini 4 以降)

Trust: 0.8

vendor:applemodel:icloudscope:eqversion:11.3 未満 (microsoft store から入手した windows 10 以降)

Trust: 0.8

vendor:applemodel:watchosscope:eqversion:6.2.8 未満 (apple watch series 1 以降)

Trust: 0.8

vendor:applemodel:iosscope:eqversion:13.6 未満 (ipod touch 第 7 世代)

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:13.4.8 未満 (apple tv hd)

Trust: 0.8

vendor:applemodel:ipadosscope:eqversion:13.6 未満 (ipad air 2 以降)

Trust: 0.8

vendor:applemodel:tvosscope:eqversion:13.4.8 未満 (apple tv 4k)

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:for windows 12.10.8 未満 (windows 7 以降)

Trust: 0.8

vendor:applemodel:macosscope: - version: -

Trust: 0.7

sources: ZDI: ZDI-20-938 // JVNDB: JVNDB-2020-010567 // NVD: CVE-2020-9875

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9875
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-010567
value: HIGH

Trust: 0.8

ZDI: CVE-2020-9875
value: HIGH

Trust: 0.7

CNNVD: CNNVD-202007-1767
value: HIGH

Trust: 0.6

VULHUB: VHN-188000
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-9875
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-9875
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-010567
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-188000
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-9875
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-010567
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

ZDI: CVE-2020-9875
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-20-938 // VULHUB: VHN-188000 // VULMON: CVE-2020-9875 // JVNDB: JVNDB-2020-010567 // CNNVD: CNNVD-202007-1767 // NVD: CVE-2020-9875

PROBLEMTYPE DATA

problemtype:CWE-190

Trust: 1.9

sources: VULHUB: VHN-188000 // JVNDB: JVNDB-2020-010567 // NVD: CVE-2020-9875

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202007-1767

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202007-1767

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-010567

PATCH

title:HT211291url:https://support.apple.com/en-us/HT211291

Trust: 0.8

title:HT211293url:https://support.apple.com/en-us/HT211293

Trust: 0.8

title:HT211294url:https://support.apple.com/en-us/HT211294

Trust: 0.8

title:HT211295url:https://support.apple.com/en-us/HT211295

Trust: 0.8

title:HT211288url:https://support.apple.com/en-us/HT211288

Trust: 0.8

title:HT211289url:https://support.apple.com/en-us/HT211289

Trust: 0.8

title:HT211290url:https://support.apple.com/en-us/HT211290

Trust: 0.8

title:HT211293url:https://support.apple.com/ja-jp/HT211293

Trust: 0.8

title:HT211294url:https://support.apple.com/ja-jp/HT211294

Trust: 0.8

title:HT211295url:https://support.apple.com/ja-jp/HT211295

Trust: 0.8

title:HT211288url:https://support.apple.com/ja-jp/HT211288

Trust: 0.8

title:HT211289url:https://support.apple.com/ja-jp/HT211289

Trust: 0.8

title:HT211290url:https://support.apple.com/ja-jp/HT211290

Trust: 0.8

title:HT211291url:https://support.apple.com/ja-jp/HT211291

Trust: 0.8

title:Apple has issued an update to correct this vulnerability.url:https://support.apple.com/en-gb/HT211293

Trust: 0.7

title:Apple iTunes for Windows ImageIO Fixes for component security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=125755

Trust: 0.6

title:Apple: iCloud for Windows 7.20url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=50e6b35a047c9702f4cdebdf81483b05

Trust: 0.1

title:Apple: iCloud for Windows 11.3url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=947a08401ec7e5f309d5ae26f5006f48

Trust: 0.1

sources: ZDI: ZDI-20-938 // VULMON: CVE-2020-9875 // JVNDB: JVNDB-2020-010567 // CNNVD: CNNVD-202007-1767

EXTERNAL IDS

db:NVDid:CVE-2020-9875

Trust: 3.3

db:ZDIid:ZDI-20-938

Trust: 1.3

db:JVNid:JVNVU95491800

Trust: 0.8

db:JVNid:JVNVU94090210

Trust: 0.8

db:JVNDBid:JVNDB-2020-010567

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-11151

Trust: 0.7

db:CNNVDid:CNNVD-202007-1767

Trust: 0.7

db:NSFOCUSid:50082

Trust: 0.6

db:CNVDid:CNVD-2020-51489

Trust: 0.1

db:VULHUBid:VHN-188000

Trust: 0.1

db:VULMONid:CVE-2020-9875

Trust: 0.1

sources: ZDI: ZDI-20-938 // VULHUB: VHN-188000 // VULMON: CVE-2020-9875 // JVNDB: JVNDB-2020-010567 // CNNVD: CNNVD-202007-1767 // NVD: CVE-2020-9875

REFERENCES

url:https://support.apple.com/kb/ht211293

Trust: 2.4

url:https://support.apple.com/kb/ht211294

Trust: 2.4

url:https://support.apple.com/kb/ht211295

Trust: 1.9

url:https://support.apple.com/kb/ht211288

Trust: 1.8

url:https://support.apple.com/kb/ht211289

Trust: 1.8

url:https://support.apple.com/kb/ht211290

Trust: 1.8

url:https://support.apple.com/kb/ht211291

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-9875

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-9875

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94090210/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95491800/index.html

Trust: 0.8

url:https://support.apple.com/en-gb/ht211293

Trust: 0.7

url:https://support.apple.com/en-us/ht211291

Trust: 0.6

url:http://www.nsfocus.net/vulndb/50082

Trust: 0.6

url:https://support.apple.com/en-us/ht211295

Trust: 0.6

url:https://www.zerodayinitiative.com/advisories/zdi-20-938/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/190.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/186159

Trust: 0.1

sources: ZDI: ZDI-20-938 // VULHUB: VHN-188000 // VULMON: CVE-2020-9875 // JVNDB: JVNDB-2020-010567 // CNNVD: CNNVD-202007-1767 // NVD: CVE-2020-9875

CREDITS

Mickey Jin of Trend Micro Mobile Security Research Team

Trust: 0.7

sources: ZDI: ZDI-20-938

SOURCES

db:ZDIid:ZDI-20-938
db:VULHUBid:VHN-188000
db:VULMONid:CVE-2020-9875
db:JVNDBid:JVNDB-2020-010567
db:CNNVDid:CNNVD-202007-1767
db:NVDid:CVE-2020-9875

LAST UPDATE DATE

2024-08-14T13:16:40.745000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-20-938date:2020-08-05T00:00:00
db:VULHUBid:VHN-188000date:2023-01-09T00:00:00
db:VULMONid:CVE-2020-9875date:2020-10-27T00:00:00
db:JVNDBid:JVNDB-2020-010567date:2021-01-27T05:47:05
db:CNNVDid:CNNVD-202007-1767date:2023-01-10T00:00:00
db:NVDid:CVE-2020-9875date:2023-01-09T16:41:59.350

SOURCES RELEASE DATE

db:ZDIid:ZDI-20-938date:2020-08-05T00:00:00
db:VULHUBid:VHN-188000date:2020-10-22T00:00:00
db:VULMONid:CVE-2020-9875date:2020-10-22T00:00:00
db:JVNDBid:JVNDB-2020-010567date:2021-01-27T05:47:05
db:CNNVDid:CNNVD-202007-1767date:2020-07-30T00:00:00
db:NVDid:CVE-2020-9875date:2020-10-22T18:15:14.613