Vulnerabilities > CVE-2020-3887 - Unspecified vulnerability in Apple products

047910
CVSS 4.3 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
PARTIAL
Availability impact
NONE
network
apple
nessus

Summary

A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A download's origin may be incorrectly associated.

Vulnerable Configurations

Part Description Count
Application
Apple
204
OS
Apple
285

Nessus

  • NASL familyWindows
    NASL idITUNES_12_10_5.NASL
    descriptionThe version of Apple iTunes installed on the remote Windows host is prior to 12.10.5. It is, therefore, affected by multiple vulnerabilities as referenced in the HT211105 advisory. Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-04-30
    modified2020-03-31
    plugin id135032
    published2020-03-31
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135032
    titleApple iTunes < 12.10.5 Multiple Vulnerabilities (credentialed check) (HT211105)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(135032);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/24");
    
      script_cve_id(
        "CVE-2020-3885",
        "CVE-2020-3887",
        "CVE-2020-3894",
        "CVE-2020-3895",
        "CVE-2020-3897",
        "CVE-2020-3899",
        "CVE-2020-3900",
        "CVE-2020-3901",
        "CVE-2020-3902",
        "CVE-2020-3909",
        "CVE-2020-3910",
        "CVE-2020-3911",
        "CVE-2020-9783"
      );
      script_xref(name:"APPLE-SA", value:"HT211105");
      script_xref(name:"APPLE-SA", value:"APPLE-SA-2020-03-20");
    
      script_name(english:"Apple iTunes < 12.10.5 Multiple Vulnerabilities (credentialed check) (HT211105)");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote host is affected by multiple vulnerabilities");
      script_set_attribute(attribute:"description", value:
    "The version of Apple iTunes installed on the remote Windows host is prior to 12.10.5. It is, therefore, affected by
    multiple vulnerabilities as referenced in the HT211105 advisory. Note that Nessus has not tested for this issue but has
    instead relied only on the application's self-reported version number.
    
    
      - A buffer overflow issue in libxm12 had issues with size validation and buffer overflow. 
        (CVE-2020-3910, CVE-2020-3909, CVE-2020-3911)
    
      - A type confusion issue in WebKit could lead to the execution of malicious crafted code 
        (CVE-2020-3901)
    
      - A Memory corruption issue in WebKit could cause a arbitary code execution vulnerability 
        (CVE-2020-3895, CVE-2020-3900)
    
       Additional vulnerabilities are detailed HT211105 in the advisory.");
      script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT211105");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apple iTunes version 12.10.5 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-3900");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/31");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:itunes");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("itunes_detect.nasl");
      script_require_keys("installed_sw/iTunes Version", "SMB/Registry/Enumerated");
    
      exit(0);
    }
    include('vcf.inc');
    
    get_kb_item_or_exit('SMB/Registry/Enumerated');
    
    app_info = vcf::get_app_info(app:'iTunes Version', win_local:TRUE);
    constraints = [{'fixed_version':'12.10.5'}];
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
    
  • NASL familyMisc.
    NASL idAPPLETV_13_4.NASL
    descriptionAccording to its banner, the version of Apple TV on the remote device is prior to 13.4. It is therefore affected by multiple vulnerabilities as described in the HT211101
    last seen2020-04-30
    modified2020-04-21
    plugin id135855
    published2020-04-21
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135855
    titleApple TV < 13.4 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(135855);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/24");
    
      script_cve_id(
        "CVE-2020-3883",
        "CVE-2020-3885",
        "CVE-2020-3887",
        "CVE-2020-3894",
        "CVE-2020-3895",
        "CVE-2020-3897",
        "CVE-2020-3899",
        "CVE-2020-3900",
        "CVE-2020-3901",
        "CVE-2020-3902",
        "CVE-2020-3909",
        "CVE-2020-3910",
        "CVE-2020-3911",
        "CVE-2020-3914",
        "CVE-2020-3917",
        "CVE-2020-3919",
        "CVE-2020-9768",
        "CVE-2020-9773",
        "CVE-2020-9783",
        "CVE-2020-9785"
      );
      script_xref(name:"APPLE-SA", value:"HT211101");
      script_xref(name:"APPLE-SA", value:"APPLE-SA-2020-03-20");
    
      script_name(english:"Apple TV < 13.4 Multiple Vulnerabilities");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Apple TV device is affected by multiple vulnerabilities");
      script_set_attribute(attribute:"description", value:
    "According to its banner, the version of Apple TV on the remote device is prior to 13.4. It is therefore affected by
    multiple vulnerabilities as described in the HT211101");
      script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT211101");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apple TV version 13.4 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-9785");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/21");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:apple_tv");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("appletv_version.nasl");
      script_require_keys("AppleTV/Version", "AppleTV/Model", "AppleTV/URL", "AppleTV/Port");
      script_require_ports("Services/www", 7000);
    
      exit(0);
    }
    
    include('audit.inc');
    include('appletv_func.inc');
    
    url = get_kb_item('AppleTV/URL');
    if (empty_or_null(url)) exit(0, 'Cannot determine Apple TV URL.');
    
    port = get_kb_item('AppleTV/Port');
    if (empty_or_null(port)) exit(0, 'Cannot determine Apple TV port.');
    
    build = get_kb_item('AppleTV/Version');
    if (empty_or_null(build)) audit(AUDIT_UNKNOWN_DEVICE_VER, 'Apple TV');
    
    model = get_kb_item('AppleTV/Model');
    if (empty_or_null(model)) exit(0, 'Cannot determine Apple TV model.');
    
    fixed_build = '17L256';
    tvos_ver = '13.4';
    
    # determine gen from the model
    gen = APPLETV_MODEL_GEN[model];
    
    appletv_check_version(
      build          : build,
      fix            : fixed_build,
      affected_gen   : make_list(4, 5),
      fix_tvos_ver   : tvos_ver,
      model          : model,
      gen            : gen,
      port           : port,
      url            : url,
      severity       : SECURITY_HOLE
    );
    
  • NASL familyPeer-To-Peer File Sharing
    NASL idITUNES_12_10_5_BANNER.NASL
    descriptionThe version of Apple iTunes installed on the remote Windows host is prior to 12.10.5. It is, therefore, affected by multiple vulnerabilities as referenced in the HT211105 advisory. Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-04-30
    modified2020-03-31
    plugin id135031
    published2020-03-31
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135031
    titleApple iTunes < 12.10.5 Multiple Vulnerabilities (uncredentialed check) (HT211105)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(135031);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/24");
    
      script_cve_id(
        "CVE-2020-3885",
        "CVE-2020-3887",
        "CVE-2020-3894",
        "CVE-2020-3895",
        "CVE-2020-3897",
        "CVE-2020-3899",
        "CVE-2020-3900",
        "CVE-2020-3901",
        "CVE-2020-3902",
        "CVE-2020-3909",
        "CVE-2020-3910",
        "CVE-2020-3911",
        "CVE-2020-9783"
      );
      script_xref(name:"APPLE-SA", value:"HT211105");
      script_xref(name:"APPLE-SA", value:"APPLE-SA-2020-03-20");
    
      script_name(english:"Apple iTunes < 12.10.5 Multiple Vulnerabilities (uncredentialed check) (HT211105)");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote host is affected by multiple vulnerabilities");
      script_set_attribute(attribute:"description", value:
    "The version of Apple iTunes installed on the remote Windows host is prior to 12.10.5. It is, therefore, affected by
    multiple vulnerabilities as referenced in the HT211105 advisory. Note that Nessus has not tested for this issue but has
    instead relied only on the application's self-reported version number.
    
      - A buffer overflow issue in libxm12 had issues with size validation and buffer overflow. 
        (CVE-2020-3910, CVE-2020-3909, CVE-2020-3911)
    
      - A type confusion issue in WebKit could lead to the execution of malicious crafted code 
        (CVE-2020-3901)
    
      - A Memory corruption issue in WebKit could cause a arbitary code execution vulnerability 
        (CVE-2020-3895, CVE-2020-3900)
    
       Additional vulnerabilities are detailed HT211105 in the advisory.");
      script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT211105");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apple iTunes version 12.10.5 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-3900");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/31");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:itunes");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Peer-To-Peer File Sharing");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("itunes_sharing.nasl");
      script_require_keys("installed_sw/iTunes DAAP");
      script_require_ports("Services/www", 3689);
    
      exit(0);
    }
    include('http.inc');
    include('vcf.inc');
    
    app = 'iTunes DAAP';
    port = get_http_port(default:3689, embedded:TRUE, ignore_broken:TRUE);
    
    app_info = vcf::get_app_info(app:app, port:port);
    if (app_info.Type != 'Windows') audit(AUDIT_OS_NOT, 'Windows');
    constraints = [{'fixed_version':'12.10.5'}];
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
    

The Hacker News

idTHN:1D059A29F13AF81A28C2D2770E5CD2E6
last seen2020-04-03
modified2020-04-03
published2020-04-03
reporterThe Hacker News
sourcehttps://thehackernews.com/2020/04/hacking-iphone-macbook-camera.html
titleHow Just Visiting A Site Could Have Hacked Your iPhone or MacBook Camera