VAR-202104-0160
Vulnerability from variot - Updated: 2024-06-14 22:03An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of IOCTL 0x10014 in the AppleIntelKBLGraphics kext. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers. Apple macOS security vulnerability, currently there is no information about this vulnerability, please keep an eye on CNNVD or manufacturer announcements
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202104-0160",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "macos",
"scope": null,
"trust": 10.5,
"vendor": "apple",
"version": null
},
{
"model": "mac os x",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "10.15.7"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "10.14.6"
},
{
"model": "macos",
"scope": "gte",
"trust": 1.0,
"vendor": "apple",
"version": "11.0"
},
{
"model": "mac os x",
"scope": "gte",
"trust": 1.0,
"vendor": "apple",
"version": "10.15"
},
{
"model": "mac os x",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.15.7"
},
{
"model": "macos",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "11.1"
},
{
"model": "mac os x",
"scope": "gte",
"trust": 1.0,
"vendor": "apple",
"version": "10.14"
},
{
"model": "mac os x",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.14.6"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"db": "ZDI",
"id": "ZDI-20-1402"
},
{
"db": "ZDI",
"id": "ZDI-20-1401"
},
{
"db": "NVD",
"id": "CVE-2020-27897"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.14.6",
"versionStartIncluding": "10.14",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "10.15.7",
"versionStartIncluding": "10.15",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "11.1",
"versionStartIncluding": "11.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-27897"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ABC Research s.r.o.",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"db": "ZDI",
"id": "ZDI-20-1402"
},
{
"db": "ZDI",
"id": "ZDI-20-1401"
}
],
"trust": 10.5
},
"cve": "CVE-2020-27897",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-372008",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2020-27897",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "ZDI",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.1,
"id": "CVE-2020-27897",
"impactScore": 6.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"trust": 10.5,
"userInteraction": "NONE",
"vectorString": "AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "ZDI",
"id": "CVE-2020-27897",
"trust": 10.5,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2020-27897",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202012-1065",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-372008",
"trust": 0.1,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2020-27897",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"db": "ZDI",
"id": "ZDI-20-1402"
},
{
"db": "ZDI",
"id": "ZDI-20-1401"
},
{
"db": "VULHUB",
"id": "VHN-372008"
},
{
"db": "VULMON",
"id": "CVE-2020-27897"
},
{
"db": "CNNVD",
"id": "CNNVD-202012-1065"
},
{
"db": "NVD",
"id": "CVE-2020-27897"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges. This vulnerability allows local attackers to escalate privileges on affected installations of Apple macOS. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.The specific flaw exists within the handling of IOCTL 0x10014 in the AppleIntelKBLGraphics kext. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. Apple macOS is a set of dedicated operating systems developed by Apple Corporation for Mac computers. Apple macOS security vulnerability, currently there is no information about this vulnerability, please keep an eye on CNNVD or manufacturer announcements",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-27897"
},
{
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"db": "ZDI",
"id": "ZDI-20-1401"
},
{
"db": "ZDI",
"id": "ZDI-20-1402"
},
{
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"db": "VULHUB",
"id": "VHN-372008"
},
{
"db": "VULMON",
"id": "CVE-2020-27897"
}
],
"trust": 10.53
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-27897",
"trust": 12.3
},
{
"db": "ZDI",
"id": "ZDI-21-486",
"trust": 2.4
},
{
"db": "ZDI",
"id": "ZDI-21-397",
"trust": 1.3
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11961",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11960",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-396",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11623",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-395",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11621",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-394",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11619",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-393",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11618",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-392",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11617",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-391",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11616",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-390",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11587",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-388",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11584",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-385",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11494",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-383",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11493",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-21-382",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11959",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11208",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-1402",
"trust": 0.7
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-11207",
"trust": 0.7
},
{
"db": "ZDI",
"id": "ZDI-20-1401",
"trust": 0.7
},
{
"db": "PACKETSTORM",
"id": "160538",
"trust": 0.7
},
{
"db": "AUSCERT",
"id": "ESB-2020.4060.2",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202012-1065",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-372008",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2020-27897",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"db": "ZDI",
"id": "ZDI-20-1402"
},
{
"db": "ZDI",
"id": "ZDI-20-1401"
},
{
"db": "VULHUB",
"id": "VHN-372008"
},
{
"db": "VULMON",
"id": "CVE-2020-27897"
},
{
"db": "CNNVD",
"id": "CNNVD-202012-1065"
},
{
"db": "NVD",
"id": "CVE-2020-27897"
}
]
},
"id": "VAR-202104-0160",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-372008"
}
],
"trust": 0.01
},
"last_update_date": "2024-06-14T22:03:37.376000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Apple has issued an update to correct this vulnerability.",
"trust": 8.4,
"url": "https://support.apple.com/en-us/ht212011"
},
{
"title": "Apple has issued an update to correct this vulnerability.",
"trust": 0.7,
"url": "https://support.apple.com/ht212011"
},
{
"title": "Apple macOS Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=137019"
},
{
"title": "Apple: macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=60a51a6d3f600c46241622f208f75bff"
},
{
"title": "macOS-iOS-system-security",
"trust": 0.1,
"url": "https://github.com/houjingyi233/macos-ios-system-security "
},
{
"title": "sec-daily-2020",
"trust": 0.1,
"url": "https://github.com/alphaseclab/sec-daily-2020 "
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"db": "VULMON",
"id": "CVE-2020-27897"
},
{
"db": "CNNVD",
"id": "CNNVD-202012-1065"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-372008"
},
{
"db": "NVD",
"id": "CVE-2020-27897"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 10.1,
"url": "https://support.apple.com/en-us/ht212011"
},
{
"trust": 2.3,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-486/"
},
{
"trust": 1.7,
"url": "https://support.apple.com/en-us/ht211931"
},
{
"trust": 0.7,
"url": "https://support.apple.com/ht212011"
},
{
"trust": 0.6,
"url": "https://www.zerodayinitiative.com/advisories/zdi-21-397/"
},
{
"trust": 0.6,
"url": "https://packetstormsecurity.com/files/160538/apple-security-advisory-2020-12-14-3.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2020.4060.2/"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-27897"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"db": "VULHUB",
"id": "VHN-372008"
},
{
"db": "CNNVD",
"id": "CNNVD-202012-1065"
},
{
"db": "NVD",
"id": "CVE-2020-27897"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"db": "ZDI",
"id": "ZDI-20-1402"
},
{
"db": "ZDI",
"id": "ZDI-20-1401"
},
{
"db": "VULHUB",
"id": "VHN-372008"
},
{
"db": "VULMON",
"id": "CVE-2020-27897"
},
{
"db": "CNNVD",
"id": "CNNVD-202012-1065"
},
{
"db": "NVD",
"id": "CVE-2020-27897"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"date": "2021-04-28T00:00:00",
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"date": "2020-12-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-1402"
},
{
"date": "2020-12-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-1401"
},
{
"date": "2021-04-02T00:00:00",
"db": "VULHUB",
"id": "VHN-372008"
},
{
"date": "2021-04-02T00:00:00",
"db": "VULMON",
"id": "CVE-2020-27897"
},
{
"date": "2020-12-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202012-1065"
},
{
"date": "2021-04-02T18:15:15.090000",
"db": "NVD",
"id": "CVE-2020-27897"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-397"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-396"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-395"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-394"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-393"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-392"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-391"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-390"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-388"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-385"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-383"
},
{
"date": "2021-03-30T00:00:00",
"db": "ZDI",
"id": "ZDI-21-382"
},
{
"date": "2021-04-28T00:00:00",
"db": "ZDI",
"id": "ZDI-21-486"
},
{
"date": "2020-12-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-1402"
},
{
"date": "2020-12-08T00:00:00",
"db": "ZDI",
"id": "ZDI-20-1401"
},
{
"date": "2021-05-04T00:00:00",
"db": "VULHUB",
"id": "VHN-372008"
},
{
"date": "2021-05-04T00:00:00",
"db": "VULMON",
"id": "CVE-2020-27897"
},
{
"date": "2021-05-06T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202012-1065"
},
{
"date": "2021-05-04T13:52:35.230000",
"db": "NVD",
"id": "CVE-2020-27897"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202012-1065"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple macOS AppleIntelKBLGraphics IOCTL 0x10011 Out-Of-Bounds Write Privilege Escalation Vulnerability",
"sources": [
{
"db": "ZDI",
"id": "ZDI-21-397"
}
],
"trust": 0.7
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202012-1065"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.