CVE-2020-27926

A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.2 and iPadOS 14.2. Processing maliciously crafted web content may lead to arbitrary code execution.
References
Link Resource
http://seclists.org/fulldisclosure/2020/Dec/26 Mailing List Third Party Advisory
https://support.apple.com/en-us/HT211929 Vendor Advisory
https://support.apple.com/kb/HT212011 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

History

10 Mar 2021, 15:12

Type Values Removed Values Added
References (CONFIRM) https://support.apple.com/kb/HT212011 - (CONFIRM) https://support.apple.com/kb/HT212011 - Vendor Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Dec/26 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Dec/26 - Mailing List, Third Party Advisory

Information

Published : 2020-12-08 21:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-27926

Mitre link : CVE-2020-27926

CVE.ORG link : CVE-2020-27926


JSON object : View

Products Affected

apple

  • iphone_os
  • ipados
CWE
CWE-416

Use After Free