CVE-2020-27930

high

Description

A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. Processing a maliciously crafted font may lead to arbitrary code execution.

References

https://www.tenable.com/cyber-exposure/2020-threat-landscape-retrospective

https://support.apple.com/en-us/HT211947

https://support.apple.com/en-us/HT211946

https://support.apple.com/en-us/HT211945

https://support.apple.com/en-us/HT211944

https://support.apple.com/en-us/HT211940

https://support.apple.com/en-us/HT211931

https://support.apple.com/en-us/HT211929

https://support.apple.com/en-us/HT211928

http://seclists.org/fulldisclosure/2020/Dec/32

http://packetstormsecurity.com/files/161294/Apple-Safari-Remote-Code-Execution.html

Details

Source: Mitre, NVD

Published: 2020-12-08

Updated: 2021-02-11

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High