{"containers":{"cna":{"affected":[{"product":"tvOS","vendor":"Apple","versions":[{"lessThan":"14.0","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"watchOS","vendor":"Apple","versions":[{"lessThan":"7.0","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"iOS and iPadOS","vendor":"Apple","versions":[{"lessThan":"14.0","status":"affected","version":"unspecified","versionType":"custom"}]},{"product":"macOS","vendor":"Apple","versions":[{"lessThan":"11.0","status":"affected","version":"unspecified","versionType":"custom"}]}],"descriptions":[{"lang":"en","value":"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to read restricted memory."}],"problemTypes":[{"descriptions":[{"description":"An application may be able to read restricted memory","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2020-12-15T19:07:19.000Z","orgId":"286789f9-fbc2-4510-9f9a-43facdede74c","shortName":"apple"},"references":[{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT211843"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT211850"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT211844"},{"tags":["x_refsource_MISC"],"url":"https://support.apple.com/en-us/HT211931"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.apple.com/kb/HT212011"},{"name":"20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://seclists.org/fulldisclosure/2020/Dec/32"},{"name":"20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://seclists.org/fulldisclosure/2020/Dec/26"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"product-security@apple.com","ID":"CVE-2020-9944","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"tvOS","version":{"version_data":[{"version_affected":"<","version_value":"14.0"}]}},{"product_name":"watchOS","version":{"version_data":[{"version_affected":"<","version_value":"7.0"}]}},{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_value":"14.0"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"11.0"}]}}]},"vendor_name":"Apple"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to read restricted memory."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"An application may be able to read restricted memory"}]}]},"references":{"reference_data":[{"name":"https://support.apple.com/en-us/HT211843","refsource":"MISC","url":"https://support.apple.com/en-us/HT211843"},{"name":"https://support.apple.com/en-us/HT211850","refsource":"MISC","url":"https://support.apple.com/en-us/HT211850"},{"name":"https://support.apple.com/en-us/HT211844","refsource":"MISC","url":"https://support.apple.com/en-us/HT211844"},{"name":"https://support.apple.com/en-us/HT211931","refsource":"MISC","url":"https://support.apple.com/en-us/HT211931"},{"name":"https://support.apple.com/kb/HT212011","refsource":"CONFIRM","url":"https://support.apple.com/kb/HT212011"},{"name":"20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2020/Dec/32"},{"name":"20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2020/Dec/26"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T10:50:56.258Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT211843"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT211850"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT211844"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://support.apple.com/en-us/HT211931"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.apple.com/kb/HT212011"},{"name":"20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2020/Dec/32"},{"name":"20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://seclists.org/fulldisclosure/2020/Dec/26"}]}]},"cveMetadata":{"assignerOrgId":"286789f9-fbc2-4510-9f9a-43facdede74c","assignerShortName":"apple","cveId":"CVE-2020-9944","datePublished":"2020-12-08T19:19:29.000Z","dateReserved":"2020-03-02T00:00:00.000Z","dateUpdated":"2024-08-04T10:50:56.258Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}