ID

VAR-202012-1523


CVE

CVE-2020-9972


TITLE

plural  Apple  Product Buffer Overflow Vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2020-014260

DESCRIPTION

A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 14.0 and iPadOS 14.0. Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution. The following products and versions are affected: iPhone 6s and later, iPod touch 7th generation, iPad Air 2 and later, and iPad mini 4 and later

Trust: 1.71

sources: NVD: CVE-2020-9972 // JVNDB: JVNDB-2020-014260 // VULHUB: VHN-188097

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:ltversion:14.3

Trust: 1.0

vendor:applemodel:ipad osscope:ltversion:14.3

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.1

Trust: 1.0

vendor:applemodel:tvosscope:ltversion:14.3

Trust: 1.0

vendor:アップルmodel:tvosscope:ltversion:(apple tv 4k)

Trust: 0.8

vendor:アップルmodel:apple mac os xscope: - version: -

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

vendor:アップルmodel:tvosscope:eqversion:14.3

Trust: 0.8

vendor:アップルmodel:tvosscope:ltversion:(apple tv hd)

Trust: 0.8

sources: JVNDB: JVNDB-2020-014260 // NVD: CVE-2020-9972

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-9972
value: HIGH

Trust: 1.0

NVD: CVE-2020-9972
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202011-1451
value: HIGH

Trust: 0.6

VULHUB: VHN-188097
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-9972
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-188097
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-9972
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-9972
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-188097 // JVNDB: JVNDB-2020-014260 // CNNVD: CNNVD-202011-1451 // NVD: CVE-2020-9972

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.1

problemtype:Classic buffer overflow (CWE-120) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-188097 // JVNDB: JVNDB-2020-014260 // NVD: CVE-2020-9972

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202011-1451

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202011-1451

PATCH

title:HT212005 Apple  Security updateurl:https://support.apple.com/en-us/HT211850

Trust: 0.8

title:Apple IO Model Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=136423

Trust: 0.6

sources: JVNDB: JVNDB-2020-014260 // CNNVD: CNNVD-202011-1451

EXTERNAL IDS

db:NVDid:CVE-2020-9972

Trust: 2.5

db:JVNid:JVNVU92546061

Trust: 0.8

db:JVNid:JVNVU95288122

Trust: 0.8

db:JVNDBid:JVNDB-2020-014260

Trust: 0.8

db:CNNVDid:CNNVD-202011-1451

Trust: 0.7

db:AUSCERTid:ESB-2020.3181.2

Trust: 0.6

db:VULHUBid:VHN-188097

Trust: 0.1

sources: VULHUB: VHN-188097 // JVNDB: JVNDB-2020-014260 // CNNVD: CNNVD-202011-1451 // NVD: CVE-2020-9972

REFERENCES

url:https://support.apple.com/kb/ht212003

Trust: 1.7

url:https://support.apple.com/kb/ht212005

Trust: 1.7

url:https://support.apple.com/kb/ht212011

Trust: 1.7

url:https://support.apple.com/en-us/ht211850

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-9972

Trust: 1.4

url:http://jvn.jp/vu/jvnvu92546061/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu95288122/index.html

Trust: 0.8

url:https://support.apple.com/en-us/ht212011

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3181.2/

Trust: 0.6

url:https://support.apple.com/en-us/ht212005

Trust: 0.6

sources: VULHUB: VHN-188097 // JVNDB: JVNDB-2020-014260 // CNNVD: CNNVD-202011-1451 // NVD: CVE-2020-9972

SOURCES

db:VULHUBid:VHN-188097
db:JVNDBid:JVNDB-2020-014260
db:CNNVDid:CNNVD-202011-1451
db:NVDid:CVE-2020-9972

LAST UPDATE DATE

2024-08-14T12:20:35.167000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-188097date:2021-09-22T00:00:00
db:JVNDBid:JVNDB-2020-014260date:2021-08-13T00:16:00
db:CNNVDid:CNNVD-202011-1451date:2021-11-03T00:00:00
db:NVDid:CVE-2020-9972date:2021-09-22T14:22:20.080

SOURCES RELEASE DATE

db:VULHUBid:VHN-188097date:2020-12-08T00:00:00
db:JVNDBid:JVNDB-2020-014260date:2021-08-13T00:00:00
db:CNNVDid:CNNVD-202011-1451date:2020-11-16T00:00:00
db:NVDid:CVE-2020-9972date:2020-12-08T20:15:17.510