exploit the possibilities

Apple Security Advisory 2020-09-16-5

Apple Security Advisory 2020-09-16-5
Posted Sep 18, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-09-16-5 - Xcode 12.0 is now available and addresses a code execution vulnerability.

tags | advisory, code execution
systems | apple
advisories | CVE-2020-9992
MD5 | aa20697b990b4cc8e09f4015dfba8ae1

Apple Security Advisory 2020-09-16-5

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2020-09-16-5 Xcode 12.0

Xcode 12.0 is now available and addresses the following:

IDE Device Support
Available for: macOS Mojave 10.15.4 and later
Impact: An attacker in a privileged network position may be able to
execute arbitrary code on a paired device during a debug session over
the network
Description: This issue was addressed by encrypting communications
over the network to devices running iOS 14, iPadOS 14, tvOS 14, and
watchOS 7.
CVE-2020-9992: Dany Lisiansky (@DanyL931), Nikias Bassen

Additional recognition

debugserver
We would like to acknowledge Linus Henze (pinauten.de) for their
assistance.

LLVM
We would like to acknowledge Brandon Azad of Google Project Zero for
their assistance.

Installation note:

Xcode 12.0 may be obtained from:

https://developer.apple.com/xcode/downloads/

To check that the Xcode has been updated:

* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "Xcode 12.0".
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl9igoYACgkQZcsbuWJ6
jjA17g//cPW08TA+cwO7nyipcSTcXdovOMGJYoIrrupmdtm9+7tbq+9qXNbcbCCU
/w8TpNXAfoJd1CD8mLzzDlZcmf2uVg+F8/0I4VkzGCp8Z4GusehXa36otdpHA4n1
53awpj656xP4C27BdYxQfkQyWp4VQNrTmIIbppvn9Ozdmx2OqqynTpxSrTApu79m
PZEBvNIlWkint7d1Fr9+GVqJh1FtOSjrH2mn9tblIUcjUEifVZtMEP8NbN0OD6JS
n6W3ivUAoRDS7jQjLUnkzQcYzXnA9iRRaHWq3VppC6k1sg8DFqqIC0trXr3PyzpG
Q1fvY7QqCqppomQ1jSSUH0+bPemu2R3QSj1w/tbB481JUfPUvklPZgBuSVIBOu67
dRC49HjUjqP9jLkrFI6rgN+O76DZeImy0o7cnjVhdessMTzT8s7Dbu8d/4ixKVTA
uLkqR/240hywZXHa2CLffAJQiUfPx7fXde1u7vx/v0tZreCq3w9ScBOmegovILSS
/cx0wT8Od/LZiPYZgGh5yGFBP99qrKIYfX9yzRSynBGDfee4dXbitFm/fUy65zg8
Yjz4eSIoZqCl9PrsW0lXqOyTs2ozrPA7jD+VwaC1ZHzn6RjMB9zTmasxOrEbZ/XK
cJ/xv6Fef/H7/k6HG8TCxOK5xvp+ZhAZkL90jW33jvSRr2ovSjo=FOfL
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    18 Files
  • 22
    Oct 22nd
    10 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close