CVE-2020-9951

A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:webkit:webkitgtk\+:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

23 Jul 2022, 10:14

Type Values Removed Values Added
First Time Apple iphone Os
Webkit
Apple tvos
Apple itunes
Apple ipados
Debian
Apple icloud
Debian debian Linux
Apple watchos
Webkit webkitgtk\+
CPE cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:a:webkit:webkitgtk\+:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*
cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
References (CONFIRM) https://support.apple.com/kb/HT211850 - (CONFIRM) https://support.apple.com/kb/HT211850 - Vendor Advisory
References (CONFIRM) https://support.apple.com/kb/HT211935 - (CONFIRM) https://support.apple.com/kb/HT211935 - Vendor Advisory
References (CONFIRM) https://support.apple.com/kb/HT211843 - (CONFIRM) https://support.apple.com/kb/HT211843 - Vendor Advisory
References (CONFIRM) https://support.apple.com/kb/HT211952 - (CONFIRM) https://support.apple.com/kb/HT211952 - Vendor Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/22 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/22 - Mailing List, Third Party Advisory
References (CONFIRM) https://support.apple.com/kb/HT211844 - (CONFIRM) https://support.apple.com/kb/HT211844 - Vendor Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/20 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/20 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/19 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/19 - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2020/dsa-4797 - (DEBIAN) https://www.debian.org/security/2020/dsa-4797 - Third Party Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2020/11/23/3 - (MLIST) http://www.openwall.com/lists/oss-security/2020/11/23/3 - Mailing List, Third Party Advisory
References (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/18 - (FULLDISC) http://seclists.org/fulldisclosure/2020/Nov/18 - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202012-10 - (GENTOO) https://security.gentoo.org/glsa/202012-10 - Third Party Advisory

Information

Published : 2020-10-16 17:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-9951

Mitre link : CVE-2020-9951

CVE.ORG link : CVE-2020-9951


JSON object : View

Products Affected

apple

  • itunes
  • iphone_os
  • safari
  • tvos
  • ipados
  • watchos
  • icloud

debian

  • debian_linux

webkit

  • webkitgtk\+
CWE
CWE-416

Use After Free