Impact: A malicious application may be able to identify what other applications a user has installedĭescription: The issue was addressed with improved handling of icon caches.ĬVE-2020-9773: Chilik Tamir of Zimperium zLabs Impact: An attacker in a privileged network position may be able to unexpectedly alter application stateĭescription: This issue was addressed with improved setting propagation.ĬVE-2020-9978: Luyi Xing, Dongfang Zhao, and Xiaofeng Wang of Indiana University Bloomington, Yan Jia of Xidian University and University of Chinese Academy of Sciences, and Bin Yuan of HuaZhong University of Science and Technology Impact: Processing a maliciously crafted font may result in the disclosure of process memoryĬVE-2020-29639: Mickey Jin & Qi Sun of Trend Micro This issue was addressed with improved input validation. Impact: Processing a maliciously crafted image may lead to arbitrary code executionĭescription: A buffer overflow was addressed with improved size validation.ĬVE-2020-9962: Yiğit Can YILMAZ added February 25, 2021ĭescription: A memory corruption issue existed in the processing of font files. Impact: Processing a maliciously crafted font file may lead to arbitrary code executionĬVE-2020-9956: Mickey Jin and Junzhi Lu of Trend Micro Mobile Security Research Team working with Trend Micro’s Zero Day Initiative Impact: Processing a maliciously crafted text file may lead to arbitrary code executionĭescription: A memory corruption issue was addressed with improved state management.Īvailable for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A use after free issue was addressed with improved memory management. Impact: Playing a malicious audio file may lead to arbitrary code executionĭescription: A buffer overflow issue was addressed with improved memory handling.ĬVE-2020-9954: Francis working with Trend Micro Zero Day Initiative, JunDong Xie of Ant Group Light-Year Security Lab Impact: Processing a maliciously crafted audio file may lead to arbitrary code executionĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2020-9960: JunDong Xie and Xingwei Lin of Ant Security Light-Year Lab Impact: An application may be able to read restricted memoryĬVE-2020-9944: JunDong Xie of Ant Group Light-Year Security Lab Impact: A malicious application may be able to read restricted memoryĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2020-9943: JunDong Xie of Ant Group Light-Year Security Lab Impact: An attacker may be able to misuse a trust relationship to download malicious contentĭescription: A trust issue was addressed by removing a legacy API.ĬVE-2020-9979: CodeColorist of LightYear Security Lab of AntGroupĪvailable for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: An application may be able to cause unexpected system termination or write kernel memoryĭescription: An out-of-bounds write issue was addressed with improved bounds checking.ĬVE-2020-9958: Mohamed Ghannam for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation) Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch (7th generation)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |