what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Apple Security Advisory 2020-09-24-1

Apple Security Advisory 2020-09-24-1
Posted Sep 25, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-09-24-1 - macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave are now available and address code execution and out of bounds read vulnerabilities.

tags | advisory, vulnerability, code execution
systems | apple
advisories | CVE-2020-9941, CVE-2020-9961, CVE-2020-9968, CVE-2020-9973
SHA-256 | fdd9824f75556374ab03a8e92e45d92345d8f1e8063a9d0891a596d681071503

Apple Security Advisory 2020-09-24-1

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental Update,
Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave

macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005
High Sierra, Security Update 2020-005 Mojave are now available and
address the following:

ImageIO
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2020-9961: Xingwei Lin of Ant Group Light-Year Security Lab

Mail
Available for: macOS High Sierra 10.13.6
Impact: A remote attacker may be able to unexpectedly alter
application state
Description: This issue was addressed with improved checks.
CVE-2020-9941: Fabian Ising of FH Münster University of Applied
Sciences and Damian Poddebniak of FH Münster University of Applied
Sciences

Model I/O
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS
Catalina 10.15
Impact: Processing a maliciously crafted USD file may lead to
unexpected application termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2020-9973: Aleksandar Nikolic of Cisco Talos

Sandbox
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS
Catalina 10.15
Impact: A malicious application may be able to access restricted
files
Description: A logic issue was addressed with improved restrictions.
CVE-2020-9968: Adam Chester(@xpn) of TrustedSec

Additional recognition

Bluetooth
We would like to acknowledge Andy Davis of NCC Group for their
assistance.

Installation note:

macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005
High Sierra, Security Update 2020-005 Mojave may be obtained from the
Mac App Store or
Apple's Software Downloads web site:
https://support.apple.com/downloads/
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl9s7fcACgkQZcsbuWJ6
jjAZ5hAAmbPoniwcDPxhkcCfVYytZcJWsR8W06dU1HNlCUzNRSf/+/kHasSGfCDd
145dNIA9kkobG4O1Rt7wlx7KFh8LDi09Giv/n0JsF8jpdz1/fISuRDppa9MyyvMv
yxmkZ59P3+/517Ohv3xTgMre0D7amVs2K5Mfw7GZt9H6Qm5ShX0OidFNwddUhZmq
tt4xSVRF4sWk2BHOuetzGqXLkaM2mI1jX/H3hO4k1xkivZm5U6v9yeYfXrUNbyBY
aCwHdWryFKoKGxST14QX+x995xn/1oN7HV9o/6dbbPwFq7626tSRhySsTmFThHfc
CR+5RXET+/HvWwojjOPG8lNenimn3cVo+SoOZfoXWfhZej+Xim44+WYp1G/htl+W
LaCuCfQ59BsYSD/eR2TE5Bb98VWfTv+EAqto8gKed5QCBZ5uIOsf1AktdlwkTzsj
8ypsynf54NHABgR7XHAlKQOpIvR7yVWOIS7QCpTysJ19W69cDvn/noNH6HO1zsuM
2pzpoP4i0D66Q1ilPx9VkpPkY9+NHJZuwnhz8xZpXt6OQ7C4gIPkrT5Ft1LMDj26
AujmBOBCI5vMCC7+iHKu4wv4sjtshH0rB+xXom5FtLSUBWrL0NBP9yveO7XBlY2t
NhTRwcsnDO7J9zI4JRfM7baETx17TLznA9z308Z/3/aew+8aX6w=
=/4hQ
-----END PGP SIGNATURE-----



Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close