APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave

Related Vulnerabilities: CVE-2020-9961   CVE-2020-9941   CVE-2020-9973   CVE-2020-9968  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->
<a href="/fulldisclosure/"><img src="/images/fulldisclosure-logo.png" class="l-logo right" alt="fulldisclosure logo" width="80"></a>
<h2 class="m-list"><a href="/fulldisclosure/">Full Disclosure</a>
mailing list archives</h2>
<!--X-User-Header-End-->
<!--X-TopPNI-->
<div class="nav-bar">
<div class="nav-link">
<a href="46"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="date.html#47">By Date</a>
<a href="48"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<div class="nav-link">
<a href="46"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="index.html#47">By Thread</a>
<a href="48"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<form class="nst-search center" action="/search/fulldisclosure">
<input class="nst-search-q" name="q" type="search" placeholder="List Archive Search">
<button class="nst-search-button" title="Search">
<img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search">
</button>
</form>

</div>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
<h1 class="m-title">APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave</h1>
<hr>
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->


<em>From</em>: Apple Product Security via Fulldisclosure &lt;fulldisclosure () seclists org&gt;


<em>Date</em>: Thu, 24 Sep 2020 16:13:29 -0700


<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<hr>
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
<pre style="margin: 0em;">-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental Update,
Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave

macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005
High Sierra, Security Update 2020-005 Mojave are now available and
address the following:

ImageIO
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2020-9961: Xingwei Lin of Ant Group Light-Year Security Lab

Mail
Available for: macOS High Sierra 10.13.6
Impact: A remote attacker may be able to unexpectedly alter
application state
Description: This issue was addressed with improved checks.
CVE-2020-9941: Fabian Ising of FH Münster University of Applied
Sciences and Damian Poddebniak of FH Münster University of Applied
Sciences

Model I/O
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS
Catalina 10.15
Impact: Processing a maliciously crafted USD file may lead to
unexpected application termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2020-9973: Aleksandar Nikolic of Cisco Talos

Sandbox
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS
Catalina 10.15
Impact: A malicious application may be able to access restricted
files
Description: A logic issue was addressed with improved restrictions.
CVE-2020-9968: Adam Chester(@xpn) of TrustedSec

Additional recognition

Bluetooth
We would like to acknowledge Andy Davis of NCC Group for their
assistance.

Installation note:

macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005
High Sierra, Security Update 2020-005 Mojave may be obtained from the
Mac App Store or
Apple's Software Downloads web site:
<a rel="nofollow" href="https://support.apple.com/downloads/">https://support.apple.com/downloads/</a>
-----BEGIN PGP SIGNATURE-----
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=/4hQ
-----END PGP SIGNATURE-----


_______________________________________________
Sent through the Full Disclosure mailing list
<a rel="nofollow" href="https://nmap.org/mailman/listinfo/fulldisclosure">https://nmap.org/mailman/listinfo/fulldisclosure</a>
Web Archives &amp; RSS: <a rel="nofollow" href="http://seclists.org/fulldisclosure/">http://seclists.org/fulldisclosure/</a></pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
<div class="nav-bar">
<div class="nav-link">
<a href="46"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="date.html#47">By Date</a>
<a href="48"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<div class="nav-link">
<a href="46"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="index.html#47">By Thread</a>
<a href="48"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
</div>
<h3 class="m-thread">Current thread:</h3>
<ul class="thread">
<li><strong>APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave</strong> <em>Apple Product Security via Fulldisclosure (Sep 24)</em>
</li></ul>


<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
<p>