ID

VAR-202104-0160


CVE

CVE-2020-27897


TITLE

Apple macOS AppleIntelKBLGraphics IOCTL 0x10011 Out-Of-Bounds Write Privilege Escalation Vulnerability

Trust: 0.7

sources: ZDI: ZDI-21-397

DESCRIPTION

An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of IOCTL 0x10008 in the AppleIntelKBLGraphics kext. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers. Apple macOS security vulnerability, currently there is no information about this vulnerability, please keep an eye on CNNVD or manufacturer announcements. Information about the security content is also available at https://support.apple.com/HT212011. AMD Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2020-27914: Yu Wang of Didi Research America CVE-2020-27915: Yu Wang of Didi Research America App Store Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to gain elevated privileges Description: This issue was addressed by removing the vulnerable code. CVE-2020-27941: shrek_wzw AppleMobileFileIntegrity Available for: macOS Big Sur 11.0.1 Impact: A malicious application may be able to bypass Privacy preferences Description: This issue was addressed with improved checks. CVE-2020-29621: Wojciech Reguła (@_r3ggi) of SecuRing Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-27910: JunDong Xie and XingWei Lin of Ant Security Light- Year Lab Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9943: JunDong Xie of Ant Security Light-Year Lab Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9944: JunDong Xie of Ant Security Light-Year Lab Audio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27916: JunDong Xie of Ant Security Light-Year Lab Bluetooth Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected application termination or heap corruption Description: Multiple integer overflows were addressed with improved input validation. CVE-2020-27906: Zuozhi Fan (@pattern_F_) of Ant Group Tianqiong Security Lab CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-27948: JunDong Xie of Ant Security Light-Year Lab CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9960: JunDong Xie and XingWei Lin of Ant Security Light-Year Lab CVE-2020-27908: JunDong Xie and XingWei Lin of Ant Security Light- Year Lab CoreAudio Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted audio file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-10017: Francis working with Trend Micro Zero Day Initiative, JunDong Xie of Ant Security Light-Year Lab CoreText Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A logic issue was addressed with improved state management. CVE-2020-27922: Mickey Jin of Trend Micro FontParser Available for: macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An information disclosure issue was addressed with improved state management. CVE-2020-27946: Mateusz Jurczyk of Google Project Zero FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A buffer overflow was addressed with improved size validation. CVE-2020-9962: Yiğit Can YILMAZ (@yilmazcanyigit) FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27952: an anonymous researcher, Mickey Jin and Junzhi Lu of Trend Micro FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-9956: Mickey Jin and Junzhi Lu of Trend Micro Mobile Security Research Team working with Trend Micro’s Zero Day Initiative FontParser Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: A memory corruption issue existed in the processing of font files. CVE-2020-27931: Apple CVE-2020-27943: Mateusz Jurczyk of Google Project Zero CVE-2020-27944: Mateusz Jurczyk of Google Project Zero Foundation Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A local user may be able to read arbitrary files Description: A logic issue was addressed with improved state management. CVE-2020-10002: James Hutchins Graphics Drivers Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2020-27947: ABC Research s.r.o. working with Trend Micro Zero Day Initiative Graphics Drivers Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application may be able to execute arbitrary code with system privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-29612: ABC Research s.r.o. working with Trend Micro Zero Day Initiative HomeKit Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An attacker in a privileged network position may be able to unexpectedly alter application state Description: This issue was addressed with improved setting propagation. CVE-2020-9978: Luyi Xing, Dongfang Zhao, and Xiaofeng Wang of Indiana University Bloomington, Yan Jia of Xidian University and University of Chinese Academy of Sciences, and Bin Yuan of HuaZhong University of Science and Technology Image Processing Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27919: Hou JingYi (@hjy79425575) of Qihoo 360 CERT, Xingwei Lin of Ant Security Light-Year Lab ImageIO Available for: macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved input validation. CVE-2020-29616: zhouat working with Trend Micro Zero Day Initiative ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-27924: Lei Sun CVE-2020-29618: XingWei Lin of Ant Security Light-Year Lab ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-29611: Ivan Fratric of Google Project Zero ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: Processing a maliciously crafted image may lead to heap corruption Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-29617: XingWei Lin of Ant Security Light-Year Lab CVE-2020-29619: XingWei Lin of Ant Security Light-Year Lab ImageIO Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write was addressed with improved input validation. CVE-2020-27912: Xingwei Lin of Ant Security Light-Year Lab CVE-2020-27923: Lei Sun Intel Graphics Driver Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-10015: ABC Research s.r.o. working with Trend Micro Zero Day Initiative CVE-2020-27897: Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc. and Luyi Xing of Indiana University Bloomington Intel Graphics Driver Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2020-27907: ABC Research s.r.o. working with Trend Micro Zero Day Initiative Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to determine kernel memory layout Description: A logic issue was addressed with improved state management. CVE-2020-10016: Alex Helie Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2020-27921: Linus Henze (pinauten.de) Kernel Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application may cause unexpected changes in memory belonging to processes traced by DTrace Description: This issue was addressed with improved checks to prevent unauthorized actions. CVE-2020-27949: Steffen Klee (@_kleest) of TU Darmstadt, Secure Mobile Networking Lab Kernel Available for: macOS Big Sur 11.0.1 Impact: A malicious application may be able to elevate privileges Description: This issue was addressed with improved entitlements. CVE-2020-29620: Csaba Fitzl (@theevilbit) of Offensive Security libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code execution Description: An integer overflow was addressed through improved input validation. CVE-2020-27911: found by OSS-Fuzz libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing maliciously crafted web content may lead to code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-27920: found by OSS-Fuzz libxml2 Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-27926: found by OSS-Fuzz libxpc Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to break out of its sandbox Description: A parsing issue in the handling of directory paths was addressed with improved path validation. CVE-2020-10014: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab Logging Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A local attacker may be able to elevate their privileges Description: A path handling issue was addressed with improved validation. CVE-2020-10010: Tommy Muir (@Muirey03) Model I/O Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted USD file may lead to unexpected application termination or arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-13524: Aleksandar Nikolic of Cisco Talos Model I/O Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Opening a maliciously crafted file may lead to unexpected application termination or arbitrary code execution Description: A logic issue was addressed with improved state management. CVE-2020-10004: Aleksandar Nikolic of Cisco Talos NSRemoteView Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved restrictions. CVE-2020-27901: Thijs Alkemade of Computest Research Division Power Management Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A malicious application may be able to determine kernel memory layout Description: A logic issue was addressed with improved state management. CVE-2020-10007: singi@theori working with Trend Micro Zero Day Initiative Quick Look Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: Processing a maliciously crafted document may lead to a cross site scripting attack Description: An access issue was addressed with improved access restrictions. CVE-2020-10012: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu of Palo Alto Networks (paloaltonetworks.com) Ruby Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A remote attacker may be able to modify the file system Description: A path handling issue was addressed with improved validation. CVE-2020-27896: an anonymous researcher System Preferences Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A logic issue was addressed with improved state management. CVE-2020-10009: Thijs Alkemade of Computest Research Division WebRTC Available for: macOS Big Sur 11.0.1 Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2020-15969: an anonymous researcher Wi-Fi Available for: macOS Mojave 10.14.6, macOS Catalina 10.15.7 Impact: An attacker may be able to bypass Managed Frame Protection Description: A denial of service issue was addressed with improved state handling. CVE-2020-27898: Stephan Marais of University of Johannesburg Installation note: macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl/YBj8ACgkQZcsbuWJ6 jjCVjw//QGrhMvU+nyuS1UwWs7rcqDJDNh0Zb7yUJali2Bdc9/l++i2pLFbmAwes 7AYCag+T3h3aP7YJAN13zb8KBmUcmnWkWupfx8kEGqHxSXnQTXvaEI59RyCobOCj OVPtboPMH1d94+6dABMp9kiLAHoZezm3hdF8ShT2Hqgq2TB16wZsa/EvhJVSaduA 7RttG6EHBTin6UU3M/+vcfJWqkg4O0YuZpQaconDa5Pd81jpUMeduzfRvS5i+PVS cehtHPWjCN15+sQ29q11yhP3v+sYh0DJEl2LWaBnDo2TlC1gHx70H5ZsAFLHChcd rXkl1tm6GV3UWVhFq0jQc1DP+IwbuL6jHI/wIjYx7itk9XECppyhhiuImOaLiIUH CBgAjwVHY1GUdTH97iPEQFF61v3sjpRLleLMZW7+9ZTt4pEDwMVHk9vKgVK5BUa6 lrKWtBHL3AtaXtxC9y8XGe3IYEBLAszHMUJfF1BR+D/niDRlztvoj72/3PPwtk2t tuUE9RGzpSXCQ1CX6vW7zS2ddVmQfJqcPX721k4OVpFNlMXkjZkm2Q/xwr5qq99v Up9BA+ITksthGYfGAY5bBV1LsjK1NtdNHQGpZe4l9bu4ONgUvmL8iBb/LnS6wKB1 HGcdHEmXvbx+Akl/fvTdG8RSvyoYuFJHkuYv0DMWiri8yN1q+C4= =osnP -----END PGP SIGNATURE-----

Trust: 9.99

sources: NVD: CVE-2020-27897 // ZDI: ZDI-21-387 // ZDI: ZDI-21-486 // ZDI: ZDI-21-378 // ZDI: ZDI-21-379 // ZDI: ZDI-21-381 // ZDI: ZDI-21-396 // ZDI: ZDI-21-397 // ZDI: ZDI-21-388 // ZDI: ZDI-21-391 // ZDI: ZDI-21-392 // ZDI: ZDI-21-393 // ZDI: ZDI-21-394 // ZDI: ZDI-21-395 // ZDI: ZDI-21-386 // VULHUB: VHN-372008 // VULMON: CVE-2020-27897 // PACKETSTORM: 160538

AFFECTED PRODUCTS

vendor:applemodel:macosscope: - version: -

Trust: 9.8

vendor:applemodel:mac os xscope:gteversion:10.15

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.15.7

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.14.6

Trust: 1.0

vendor:applemodel:macosscope:ltversion:11.1

Trust: 1.0

vendor:applemodel:macosscope:gteversion:11.0

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.15.7

Trust: 1.0

vendor:applemodel:mac os xscope:ltversion:10.14.6

Trust: 1.0

vendor:applemodel:mac os xscope:gteversion:10.14

Trust: 1.0

sources: ZDI: ZDI-21-397 // ZDI: ZDI-21-396 // ZDI: ZDI-21-395 // ZDI: ZDI-21-394 // ZDI: ZDI-21-393 // ZDI: ZDI-21-392 // ZDI: ZDI-21-391 // ZDI: ZDI-21-388 // ZDI: ZDI-21-387 // ZDI: ZDI-21-386 // ZDI: ZDI-21-381 // ZDI: ZDI-21-379 // ZDI: ZDI-21-378 // ZDI: ZDI-21-486 // NVD: CVE-2020-27897

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2020-27897
value: HIGH

Trust: 9.8

nvd@nist.gov: CVE-2020-27897
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202012-1065
value: HIGH

Trust: 0.6

VULHUB: VHN-372008
value: HIGH

Trust: 0.1

VULMON: CVE-2020-27897
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-27897
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-372008
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

ZDI: CVE-2020-27897
baseSeverity: HIGH
baseScore: 7.8
vectorString: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.1
impactScore: 6.0
version: 3.0

Trust: 9.8

nvd@nist.gov: CVE-2020-27897
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: ZDI: ZDI-21-397 // ZDI: ZDI-21-396 // ZDI: ZDI-21-395 // ZDI: ZDI-21-394 // ZDI: ZDI-21-393 // ZDI: ZDI-21-392 // ZDI: ZDI-21-391 // ZDI: ZDI-21-388 // ZDI: ZDI-21-387 // ZDI: ZDI-21-386 // ZDI: ZDI-21-381 // ZDI: ZDI-21-379 // ZDI: ZDI-21-378 // ZDI: ZDI-21-486 // VULHUB: VHN-372008 // VULMON: CVE-2020-27897 // CNNVD: CNNVD-202012-1065 // NVD: CVE-2020-27897

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-372008 // NVD: CVE-2020-27897

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202012-1065

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202012-1065

PATCH

title:Apple has issued an update to correct this vulnerability.url:https://support.apple.com/en-us/HT212011

Trust: 9.1

title:Apple has issued an update to correct this vulnerability.url:https://support.apple.com/HT212011

Trust: 0.7

title:Apple macOS Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=137019

Trust: 0.6

title:Apple: macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojaveurl:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=60a51a6d3f600c46241622f208f75bff

Trust: 0.1

title:macOS-iOS-system-securityurl:https://github.com/houjingyi233/macOS-iOS-system-security

Trust: 0.1

title:sec-daily-2020url:https://github.com/alphaSeclab/sec-daily-2020

Trust: 0.1

sources: ZDI: ZDI-21-397 // ZDI: ZDI-21-396 // ZDI: ZDI-21-395 // ZDI: ZDI-21-394 // ZDI: ZDI-21-393 // ZDI: ZDI-21-392 // ZDI: ZDI-21-391 // ZDI: ZDI-21-388 // ZDI: ZDI-21-387 // ZDI: ZDI-21-386 // ZDI: ZDI-21-381 // ZDI: ZDI-21-379 // ZDI: ZDI-21-378 // ZDI: ZDI-21-486 // VULMON: CVE-2020-27897 // CNNVD: CNNVD-202012-1065

EXTERNAL IDS

db:NVDid:CVE-2020-27897

Trust: 11.7

db:ZDIid:ZDI-21-486

Trust: 2.4

db:ZDIid:ZDI-21-397

Trust: 1.3

db:PACKETSTORMid:160538

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-11961

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11960

Trust: 0.7

db:ZDIid:ZDI-21-396

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11623

Trust: 0.7

db:ZDIid:ZDI-21-395

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11621

Trust: 0.7

db:ZDIid:ZDI-21-394

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11619

Trust: 0.7

db:ZDIid:ZDI-21-393

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11618

Trust: 0.7

db:ZDIid:ZDI-21-392

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11617

Trust: 0.7

db:ZDIid:ZDI-21-391

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11587

Trust: 0.7

db:ZDIid:ZDI-21-388

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11586

Trust: 0.7

db:ZDIid:ZDI-21-387

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11585

Trust: 0.7

db:ZDIid:ZDI-21-386

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11473

Trust: 0.7

db:ZDIid:ZDI-21-381

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11470

Trust: 0.7

db:ZDIid:ZDI-21-379

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11469

Trust: 0.7

db:ZDIid:ZDI-21-378

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-11959

Trust: 0.7

db:AUSCERTid:ESB-2020.4060.2

Trust: 0.6

db:CNNVDid:CNNVD-202012-1065

Trust: 0.6

db:VULHUBid:VHN-372008

Trust: 0.1

db:VULMONid:CVE-2020-27897

Trust: 0.1

sources: ZDI: ZDI-21-397 // ZDI: ZDI-21-396 // ZDI: ZDI-21-395 // ZDI: ZDI-21-394 // ZDI: ZDI-21-393 // ZDI: ZDI-21-392 // ZDI: ZDI-21-391 // ZDI: ZDI-21-388 // ZDI: ZDI-21-387 // ZDI: ZDI-21-386 // ZDI: ZDI-21-381 // ZDI: ZDI-21-379 // ZDI: ZDI-21-378 // ZDI: ZDI-21-486 // VULHUB: VHN-372008 // VULMON: CVE-2020-27897 // PACKETSTORM: 160538 // CNNVD: CNNVD-202012-1065 // NVD: CVE-2020-27897

REFERENCES

url:https://support.apple.com/en-us/ht212011

Trust: 10.8

url:https://www.zerodayinitiative.com/advisories/zdi-21-486/

Trust: 2.3

url:https://support.apple.com/en-us/ht211931

Trust: 1.7

url:https://support.apple.com/ht212011

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-27897

Trust: 0.7

url:https://www.zerodayinitiative.com/advisories/zdi-21-397/

Trust: 0.6

url:https://packetstormsecurity.com/files/160538/apple-security-advisory-2020-12-14-3.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.4060.2/

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-10014

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13524

Trust: 0.1

url:https://support.apple.com/kb/ht201222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27903

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10016

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27910

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27907

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10015

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10017

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15969

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27912

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27901

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27896

Trust: 0.1

url:https://support.apple.com/ht212011.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27898

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27914

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27908

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27911

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10009

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27915

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10004

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27916

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10012

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-27906

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10007

Trust: 0.1

sources: ZDI: ZDI-21-397 // ZDI: ZDI-21-396 // ZDI: ZDI-21-395 // ZDI: ZDI-21-394 // ZDI: ZDI-21-393 // ZDI: ZDI-21-392 // ZDI: ZDI-21-391 // ZDI: ZDI-21-388 // ZDI: ZDI-21-387 // ZDI: ZDI-21-386 // ZDI: ZDI-21-381 // ZDI: ZDI-21-379 // ZDI: ZDI-21-378 // ZDI: ZDI-21-486 // VULHUB: VHN-372008 // PACKETSTORM: 160538 // CNNVD: CNNVD-202012-1065 // NVD: CVE-2020-27897

CREDITS

ABC Research s.r.o.

Trust: 9.8

sources: ZDI: ZDI-21-397 // ZDI: ZDI-21-396 // ZDI: ZDI-21-395 // ZDI: ZDI-21-394 // ZDI: ZDI-21-393 // ZDI: ZDI-21-392 // ZDI: ZDI-21-391 // ZDI: ZDI-21-388 // ZDI: ZDI-21-387 // ZDI: ZDI-21-386 // ZDI: ZDI-21-381 // ZDI: ZDI-21-379 // ZDI: ZDI-21-378 // ZDI: ZDI-21-486

SOURCES

db:ZDIid:ZDI-21-397
db:ZDIid:ZDI-21-396
db:ZDIid:ZDI-21-395
db:ZDIid:ZDI-21-394
db:ZDIid:ZDI-21-393
db:ZDIid:ZDI-21-392
db:ZDIid:ZDI-21-391
db:ZDIid:ZDI-21-388
db:ZDIid:ZDI-21-387
db:ZDIid:ZDI-21-386
db:ZDIid:ZDI-21-381
db:ZDIid:ZDI-21-379
db:ZDIid:ZDI-21-378
db:ZDIid:ZDI-21-486
db:VULHUBid:VHN-372008
db:VULMONid:CVE-2020-27897
db:PACKETSTORMid:160538
db:CNNVDid:CNNVD-202012-1065
db:NVDid:CVE-2020-27897

LAST UPDATE DATE

2025-03-29T21:53:01.141000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-21-397date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-396date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-395date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-394date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-393date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-392date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-391date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-388date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-387date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-386date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-381date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-379date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-378date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-486date:2021-04-28T00:00:00
db:VULHUBid:VHN-372008date:2021-05-04T00:00:00
db:VULMONid:CVE-2020-27897date:2021-05-04T00:00:00
db:CNNVDid:CNNVD-202012-1065date:2021-05-06T00:00:00
db:NVDid:CVE-2020-27897date:2024-11-21T05:22:00.443

SOURCES RELEASE DATE

db:ZDIid:ZDI-21-397date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-396date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-395date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-394date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-393date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-392date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-391date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-388date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-387date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-386date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-381date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-379date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-378date:2021-03-30T00:00:00
db:ZDIid:ZDI-21-486date:2021-04-28T00:00:00
db:VULHUBid:VHN-372008date:2021-04-02T00:00:00
db:VULMONid:CVE-2020-27897date:2021-04-02T00:00:00
db:PACKETSTORMid:160538date:2020-12-16T17:58:29
db:CNNVDid:CNNVD-202012-1065date:2020-12-15T00:00:00
db:NVDid:CVE-2020-27897date:2021-04-02T18:15:15.090