Lucene search

K
kasperskyKaspersky LabKLA12017
HistoryDec 02, 2020 - 12:00 a.m.

KLA12017 Mulitple vulnerabilities in Apple iCloud

2020-12-0200:00:00
Kaspersky Lab
threats.kaspersky.com
32

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.007

Percentile

79.6%

Multiple vulnerabilities were found in Apple iCloud. Malicious users can exploit these vulnerabilities to execute arbitrary code, cause denial of service, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A use after free vulnerability in WebKit can be exploiter remotely via special crafted webpage to execute arbitrary code.
  2. An out-of-bounds read vulnerability in ImageIO can be exploited remotely via special crafted image to execute arbitrary code.
  3. A security vulnerability in SQLite can be exploited remotely to cause denial of service.
  4. A use after free vulnerability in libxml2 can be exploited remotely via special crafted file to execute arbitrary code.
  5. An out-of-bounds write vulnerability in WebKit can be exploited renotely via special crafted web page to execute arbitrary code.
  6. A security bypass vulnerability in SQLite can be exploited via special crafted SQL query to cause denial of service.
  7. A memory corruption vulnerability in SQLite can be exploited remotely to execute arbitrary code.
  8. An information disclosure vulnerability in SQLite can be exploited remotely to obtain sensitive information.
  9. A security vulnerability in Foundation can be exploited locally to security bypass restrictions and obtain sensitive information.
  10. A use after free vulnerability in libxml2 can be exploited remotely via special crafted web page to execute arbitrary code.
  11. A use after free vulnerability in WebKit can be exploited remotely via special crafted web page to execute arbitrary code.
  12. An integer overflow vulnerability in libxml2 can be exploited remotely to cause denial of service or execute arbitrary code.
  13. An out-of-bounds write vulnerability in ImageIO can be exploited via special crafted file to execute arbitrary code.
  14. A memory corruption vulnerability in CoreText can be exploited remotely via special crafted text file to execute arbitrary code.

Original advisories

About the security content of iCloud for Windows 11.5

Related products

Apple-iCloud

CVE list

CVE-2020-9951 critical

CVE-2020-9961 critical

CVE-2020-13435 high

CVE-2020-13434 high

CVE-2020-9981 critical

CVE-2020-9983 critical

CVE-2020-9947 critical

CVE-2020-9999 critical

CVE-2020-13631 high

CVE-2020-13630 high

CVE-2020-9849 high

CVE-2020-10002 high

CVE-2020-27917 critical

CVE-2020-27918 critical

CVE-2020-27911 critical

CVE-2020-27912 critical

Solution

Update to the latest version

Download iCloud

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • XSS/CSS

Cross site scripting. Exploitation of vulnerabilities with this impact can lead to partial interception of information transmitted between user and site.

  • OAF

Overwrite arbitrary files. Exploitation of vulnerabilities with this impact can lead to loss of some information, contained in overwritten files.

Affected Products

  • Apple iCloud for Windows earlier than 11.5

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.007

Percentile

79.6%