[<prev] [next>] [day] [month] [year] [list]
Message-id: <D00573A3-BBA4-4DFC-BC19-992260A98E89@lists.apple.com>
Date: Tue, 26 May 2020 17:24:34 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: Apple Product Security via Security-announce
<security-announce@...ts.apple.com>
Subject: [FD] APPLE-SA-2020-05-26-9 iCloud for Windows 11.2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2020-05-26-9 iCloud for Windows 11.2
iCloud for Windows 11.2 is now available and addresses the following:
ImageIO
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: An out-of-bounds write issue was addressed with improved
bounds checking.
CVE-2020-9789: Wenchao Li of VARAS@IIE
CVE-2020-9790: Xingwei Lin of Ant-financial Light-Year Security Lab
ImageIO
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2020-3878: Samuel Groß of Google Project Zero
SQLite
Available for: Windows 10 and later via the Microsoft Store
Impact: A malicious application may cause a denial of service or
potentially disclose memory contents
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2020-9794
WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A logic issue was addressed with improved restrictions.
CVE-2020-9802: Samuel Groß of Google Project Zero
WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may lead to
universal cross site scripting
Description: A logic issue was addressed with improved restrictions.
CVE-2020-9805: an anonymous researcher
WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A type confusion issue was addressed with improved
memory handling.
CVE-2020-9800: Brendan Draper (@6r3nd4n) working with Trend Micro
Zero Day Initiative
WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A memory corruption issue was addressed with improved
state management.
CVE-2020-9806: Wen Xu of SSLab at Georgia Tech
CVE-2020-9807: Wen Xu of SSLab at Georgia Tech
WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: A remote attacker may be able to cause arbitrary code
execution
Description: A logic issue was addressed with improved restrictions.
CVE-2020-9850: @jinmo123, @setuid0x0_, and @insu_yun_en of
@SSLab_Gatech working with Trend Micro’s Zero Day Initiative
WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may lead to a
cross site scripting attack
Description: An input validation issue was addressed with improved
input validation.
CVE-2020-9843: Ryan Pickren (ryanpickren.com)
WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A memory corruption issue was addressed with improved
validation.
CVE-2020-9803: Wen Xu of SSLab at Georgia Tech
Additional recognition
ImageIO
We would like to acknowledge Lei Sun for their assistance.
WebKit
We would like to acknowledge Aidan Dunlap of UT Austin for their
assistance.
Installation note:
iCloud for Windows 11.2 may be obtained from:
https://support.apple.com/HT204283
-----BEGIN PGP SIGNATURE-----
Version: BCPG v1.64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=v2Wk
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists