exploit the possibilities

Apple Security Advisory 2020-11-05-2

Apple Security Advisory 2020-11-05-2
Posted Nov 9, 2020
Authored by Apple | Site apple.com

Apple Security Advisory 2020-11-05-2 - iOS 12.4.9 is now available and addresses a code execution vulnerability.

tags | advisory, code execution
systems | apple, ios
advisories | CVE-2020-27929, CVE-2020-27930, CVE-2020-27932, CVE-2020-27950
MD5 | e403bd4c30b82e389c6c41871b8a9527

Apple Security Advisory 2020-11-05-2

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2020-11-05-2 iOS 12.4.9

iOS 12.4.9 is now available and address the following issues.
Information about the security content is also available at
https://support.apple.com/HT211940.

FaceTime
Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2
and 3, iPod touch (6th generation)
Impact: A user may send video in Group FaceTime calls without knowing
that they have done so
Description: A logic issue existed in the handling of Group FaceTime
calls. The issue was addressed with improved state management.
CVE-2020-27929: James P (@Jam_Penn)

FontParser
Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2
and 3, iPod touch (6th generation)
Impact: Processing a maliciously crafted font may lead to arbitrary
code execution. Apple is aware of reports that an exploit for this
issue exists in the wild.
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2020-27930: Google Project Zero

Kernel
Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2
and 3, iPod touch (6th generation)
Impact: A malicious application may be able to disclose kernel
memory. Apple is aware of reports that an exploit for this issue
exists in the wild.
Description: A memory initialization issue was addressed.
CVE-2020-27950: Google Project Zero

Kernel
Available for: iPhone 5s, iPhone 6 and 6 Plus, iPad Air, iPad mini 2
and 3, iPod touch (6th generation)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges. Apple is aware of reports that an exploit for
this issue exists in the wild.
Description: A type confusion issue was addressed with improved state
handling.
CVE-2020-27932: Google Project Zero

Installation note:

This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from https://www.apple.com/itunes/

iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.

The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.

To check that the iPhone, iPod touch, or iPad has been updated:

* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 12.4.9".

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
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=bql1
-----END PGP SIGNATURE-----


Login or Register to add favorites

File Archive:

January 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    4 Files
  • 2
    Jan 2nd
    3 Files
  • 3
    Jan 3rd
    3 Files
  • 4
    Jan 4th
    33 Files
  • 5
    Jan 5th
    31 Files
  • 6
    Jan 6th
    21 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    19 Files
  • 9
    Jan 9th
    1 Files
  • 10
    Jan 10th
    1 Files
  • 11
    Jan 11th
    33 Files
  • 12
    Jan 12th
    19 Files
  • 13
    Jan 13th
    27 Files
  • 14
    Jan 14th
    8 Files
  • 15
    Jan 15th
    16 Files
  • 16
    Jan 16th
    1 Files
  • 17
    Jan 17th
    2 Files
  • 18
    Jan 18th
    20 Files
  • 19
    Jan 19th
    32 Files
  • 20
    Jan 20th
    15 Files
  • 21
    Jan 21st
    10 Files
  • 22
    Jan 22nd
    16 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close