Easy Read Time: 4 Minutes

From: Jubin Pejman

Fixing known Vulnerabilities and Flaws with MacBook Pro (MAC-OS)

Apple has released a package of security patches through its range of products. The seven updates fix dozens of CVE-listed bugs in the Cupertino’s portables and desktop devices’ firmware and software modules. Now is a great time to get patching because you always need to be protected. The 13.4 (https://support.apple.com/en-us/HT211102) update for the flagship iOS provides patches for 30 security loopholes.

The iOS kernel also has a relatively serious arbitrary code execution vulnerability (CVE-2020-9785) and a transparency information error (CVE-2020-3914). Both allow a hacker to have code already running on a computer.

  • (CVE-2020-9785)

Multiple problems relating to memory corruption were resolved with better state management. The iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2 address this problem. A malicious program can be able to use kernel privileges to run arbitrary code.

  • (CVE-2020-3914)

Improved memory management has solved a problem of memory initialization. The iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2 address this problem. A restricted memory can often be read by an application.

The bugs in WebKit, the web engine at the heart of iOS are among the most critical ones. These include:

Blunders for Cross-Site Scripting

  • CVE-2020-3902

Enhanced data reliability has resolved an problem of input validation. In iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, and iCloud for Windows 7.18 this problem is resolved. Processing maliciously designed web content will result in a site-wide scripting attack.

Disclosure of Information

  • CVE-2020-3894

For additional validation, a race problem was addressed. In iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, and iCloud for Windows 7.18 this problem is resolved. A restricted memory can be readable by an app.

Execution of Remote Code

  • CVE-2020-3897

Improved memory management has resolved a type confusion problem. This problem has been resolved in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, Windows 10.9.3, Windows 7.18, iCloud. Problem could trigger arbitrary execution of code by a remote attacker.

  • CVE-2020-9783

Improved memory optimization has solved a use after free issue. In iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, and iCloud for Windows 7.18 this problem is resolved. Processing maliciously designed web content will contribute to code execution.

  • CVE-2020-3901

Improved memory management has resolved a type confusion problem. This problem has been resolved in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, Windows 10.9.3, Windows 7.18, iCloud. The creation of maliciously designed web content will lead to execution of arbitrary code.

  • CVE-2020-3895

Improved memory management has resolved a memory corruption problem. This problem has been resolved in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, iTunes for Windows 12.10.5, Windows 10.9.3, Windows 7.18, iCloud. The creation of maliciously designed web content will lead to execution of arbitrary code.

  • CVE-2020-3900

Better memory management has solved a memory leakage problem. The problem is resolved in iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2, Safari 13.1, Windows iTunes 12.10.5, Windows iCloud 10.9.3, and Windows iCloud 7.18. Processing maliciously designed web content may lead to the execution of arbitrary code.

  • CVE-2020-3899
  • Better memory management has solved a problem of memory consumption. In iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, and iCloud for Windows 7.18 this problem is resolved that ould trigger arbitrary execution of code by a remote attacker.

Locally exploitable vulnerabilities in the execution of arbitrary code in Image Processing (CVE-2020-9768), IOHIDFamily (CVE-2020-3919) were also addressed. Similarly, there were vulnerabilities found in Messages (CVE-2020-3891) a lock screen bypass flaw and two data exposure bugs in Safari (CVE-2020-9775, CVE-2020-9781) along with a communication intercept error in Bluetooth (CVE-2020-9770).

  • CVE-2020-9768

Improved memory management has solved a use after free issue. The iOS 13.4 and iPadOS 13.4, tvOS 13.4, watchOS 6.2 correct this problem. A program can use device privileges to execute arbitrary code.

  • CVE-2020-3919

Improved memory management has solved a problem of memory initialization. The iOS 13.4 and iPadOS 13.4, macOS Catalina 10.15.4, tvOS 13.4, watchOS 6.2 address this problem. A malicious program can be able to use kernel privileges to run arbitrary code.

  • CVE-2020-3891

With improved state control a logic problem has been resolved. This problem is resolved in iOS 13.4, watchOS 6.2 and iPadOS 13.4. When replies are disabled, a person with physical access to a locked iOS device can be able to respond to messages.

  • CVE-2020-9775

There was an issue with the handling of tabs showing image in picture video. The problem was rectified with better management of the administration. Enabled in iOS 13.4 and iPadOS 13.4. Private browsing action of a user can be saved in Screen Time, unexpectedly.

  • CVE-2020-9781

The problem was dealt with by prompts to clear website permission after navigation. Enabled in iOS 13.4 and iPadOS 13.4. Users may give permissions to a website that they did not intend to give.

  • CVE-2020-9770

With improved state management a logic problem has been resolved. Enabled in iOS 13.4 and iPadOS 13.4. An attacker in a privileged role on the network may be able to intercept Bluetooth traffic.

The macOS update (Catalina 10.15.4, Mojave and High Sierra software upgrade 2020-002 includes patches for 26 CVE issues. Among the more notable are a “sudo” error (CVE-2019-19232) that causes commands to function “as a non-existent user” and a restricted memory access fault in the Intel Graphics Driver (CVE-2019-14615) as well as what was defined in Vim (CVE-2020-9769) as just “multiple problems.”

  • CVE-2019-19232

An intruder with access to a Runas ALL sudoer account in Sudo by 1.8.29 will impersonate a non-existent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The program maintainer claims this is not a weakness as it is an deliberate function to execute a command via sudo as a user who is not present in the local password database. Since some users were shocked by this behaviour, sudo 1.8.30 added an option to enable / disable the behaviour with the default disabled. Nevertheless, this does not change the fact that in earlier versions sudo behaved as expected, and as recorded.

  • CVE-2019-14615

On certain Intel(R) Processors with Intel(R) Processor Graphics, inadequate control flow in some data structures may enable an unauthenticated user to potentially enable the disclosure of information through local access.

  • CVE-2020-9769

The update to version 8.1.1850 resolved several problems. This problem is fixed in Catalina 10.15.4 of macOS. Several issues with Vim.

Mac users can also get patches for the kernel and IOHIDFamily bugs mentioned above, an indication of how similar iOS and macOS have become. The web Safari 13.1 update also includes all of the iOS WebKit bugs, which is no surprise because the engine operates both the computer and the smartphone browsers.