Vulnerabilities > CVE-2020-3894 - Race Condition vulnerability in Apple products

047910
CVSS 3.1 - LOW
Attack vector
NETWORK
Attack complexity
HIGH
Privileges required
NONE
Confidentiality impact
LOW
Integrity impact
NONE
Availability impact
NONE
network
high complexity
apple
CWE-362
nessus

Summary

A race condition was addressed with additional validation. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. An application may be able to read restricted memory.

Vulnerable Configurations

Part Description Count
Application
Apple
220
OS
Apple
299

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Leveraging Race Conditions
    This attack targets a race condition occurring when multiple processes access and manipulate the same resource concurrently and the outcome of the execution depends on the particular order in which the access takes place. The attacker can leverage a race condition by "running the race", modifying the resource and modifying the normal execution flow. For instance a race condition can occur while accessing a file, the attacker can trick the system by replacing the original file with his version and cause the system to read the malicious file.
  • Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
    This attack targets a race condition occurring between the time of check (state) for a resource and the time of use of a resource. The typical example is the file access. The attacker can leverage a file access race condition by "running the race", meaning that he would modify the resource between the first time the target program accesses the file and the time the target program uses the file. During that period of time, the attacker could do something such as replace the file and cause an escalation of privilege.

Nessus

  • NASL familyWindows
    NASL idITUNES_12_10_5.NASL
    descriptionThe version of Apple iTunes installed on the remote Windows host is prior to 12.10.5. It is, therefore, affected by multiple vulnerabilities as referenced in the HT211105 advisory. Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-04-30
    modified2020-03-31
    plugin id135032
    published2020-03-31
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135032
    titleApple iTunes < 12.10.5 Multiple Vulnerabilities (credentialed check) (HT211105)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(135032);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/24");
    
      script_cve_id(
        "CVE-2020-3885",
        "CVE-2020-3887",
        "CVE-2020-3894",
        "CVE-2020-3895",
        "CVE-2020-3897",
        "CVE-2020-3899",
        "CVE-2020-3900",
        "CVE-2020-3901",
        "CVE-2020-3902",
        "CVE-2020-3909",
        "CVE-2020-3910",
        "CVE-2020-3911",
        "CVE-2020-9783"
      );
      script_xref(name:"APPLE-SA", value:"HT211105");
      script_xref(name:"APPLE-SA", value:"APPLE-SA-2020-03-20");
    
      script_name(english:"Apple iTunes < 12.10.5 Multiple Vulnerabilities (credentialed check) (HT211105)");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote host is affected by multiple vulnerabilities");
      script_set_attribute(attribute:"description", value:
    "The version of Apple iTunes installed on the remote Windows host is prior to 12.10.5. It is, therefore, affected by
    multiple vulnerabilities as referenced in the HT211105 advisory. Note that Nessus has not tested for this issue but has
    instead relied only on the application's self-reported version number.
    
    
      - A buffer overflow issue in libxm12 had issues with size validation and buffer overflow. 
        (CVE-2020-3910, CVE-2020-3909, CVE-2020-3911)
    
      - A type confusion issue in WebKit could lead to the execution of malicious crafted code 
        (CVE-2020-3901)
    
      - A Memory corruption issue in WebKit could cause a arbitary code execution vulnerability 
        (CVE-2020-3895, CVE-2020-3900)
    
       Additional vulnerabilities are detailed HT211105 in the advisory.");
      script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT211105");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apple iTunes version 12.10.5 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-3900");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/31");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:itunes");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("itunes_detect.nasl");
      script_require_keys("installed_sw/iTunes Version", "SMB/Registry/Enumerated");
    
      exit(0);
    }
    include('vcf.inc');
    
    get_kb_item_or_exit('SMB/Registry/Enumerated');
    
    app_info = vcf::get_app_info(app:'iTunes Version', win_local:TRUE);
    constraints = [{'fixed_version':'12.10.5'}];
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
    
  • NASL familyMisc.
    NASL idAPPLETV_13_4.NASL
    descriptionAccording to its banner, the version of Apple TV on the remote device is prior to 13.4. It is therefore affected by multiple vulnerabilities as described in the HT211101
    last seen2020-04-30
    modified2020-04-21
    plugin id135855
    published2020-04-21
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135855
    titleApple TV < 13.4 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(135855);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/24");
    
      script_cve_id(
        "CVE-2020-3883",
        "CVE-2020-3885",
        "CVE-2020-3887",
        "CVE-2020-3894",
        "CVE-2020-3895",
        "CVE-2020-3897",
        "CVE-2020-3899",
        "CVE-2020-3900",
        "CVE-2020-3901",
        "CVE-2020-3902",
        "CVE-2020-3909",
        "CVE-2020-3910",
        "CVE-2020-3911",
        "CVE-2020-3914",
        "CVE-2020-3917",
        "CVE-2020-3919",
        "CVE-2020-9768",
        "CVE-2020-9773",
        "CVE-2020-9783",
        "CVE-2020-9785"
      );
      script_xref(name:"APPLE-SA", value:"HT211101");
      script_xref(name:"APPLE-SA", value:"APPLE-SA-2020-03-20");
    
      script_name(english:"Apple TV < 13.4 Multiple Vulnerabilities");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Apple TV device is affected by multiple vulnerabilities");
      script_set_attribute(attribute:"description", value:
    "According to its banner, the version of Apple TV on the remote device is prior to 13.4. It is therefore affected by
    multiple vulnerabilities as described in the HT211101");
      script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT211101");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apple TV version 13.4 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-9785");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/04/21");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:apple_tv");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("appletv_version.nasl");
      script_require_keys("AppleTV/Version", "AppleTV/Model", "AppleTV/URL", "AppleTV/Port");
      script_require_ports("Services/www", 7000);
    
      exit(0);
    }
    
    include('audit.inc');
    include('appletv_func.inc');
    
    url = get_kb_item('AppleTV/URL');
    if (empty_or_null(url)) exit(0, 'Cannot determine Apple TV URL.');
    
    port = get_kb_item('AppleTV/Port');
    if (empty_or_null(port)) exit(0, 'Cannot determine Apple TV port.');
    
    build = get_kb_item('AppleTV/Version');
    if (empty_or_null(build)) audit(AUDIT_UNKNOWN_DEVICE_VER, 'Apple TV');
    
    model = get_kb_item('AppleTV/Model');
    if (empty_or_null(model)) exit(0, 'Cannot determine Apple TV model.');
    
    fixed_build = '17L256';
    tvos_ver = '13.4';
    
    # determine gen from the model
    gen = APPLETV_MODEL_GEN[model];
    
    appletv_check_version(
      build          : build,
      fix            : fixed_build,
      affected_gen   : make_list(4, 5),
      fix_tvos_ver   : tvos_ver,
      model          : model,
      gen            : gen,
      port           : port,
      url            : url,
      severity       : SECURITY_HOLE
    );
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-4681.NASL
    descriptionThe following vulnerability has been discovered in the webkit2gtk web engine : - CVE-2020-3885 Ryan Pickren discovered that a file URL may be incorrectly processed. - CVE-2020-3894 Sergei Glazunov discovered that a race condition may allow an application to read restricted memory. - CVE-2020-3895 grigoritchy discovered that processing maliciously crafted web content may lead to arbitrary code execution. - CVE-2020-3897 Brendan Draper discovered that a remote attacker may be able to cause arbitrary code execution. - CVE-2020-3899 OSS-Fuzz discovered that a remote attacker may be able to cause arbitrary code execution. - CVE-2020-3900 Dongzhuo Zhao discovered that processing maliciously crafted web content may lead to arbitrary code execution. - CVE-2020-3901 Benjamin Randazzo discovered that processing maliciously crafted web content may lead to arbitrary code execution. - CVE-2020-3902 Yigit Can Yilmaz discovered that processing maliciously crafted web content may lead to a cross site scripting attack.
    last seen2020-05-15
    modified2020-05-08
    plugin id136413
    published2020-05-08
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/136413
    titleDebian DSA-4681-1 : webkit2gtk - security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-4681. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(136413);
      script_version("1.2");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/13");
    
      script_cve_id("CVE-2020-3885", "CVE-2020-3894", "CVE-2020-3895", "CVE-2020-3897", "CVE-2020-3899", "CVE-2020-3900", "CVE-2020-3901", "CVE-2020-3902");
      script_xref(name:"DSA", value:"4681");
    
      script_name(english:"Debian DSA-4681-1 : webkit2gtk - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "The following vulnerability has been discovered in the webkit2gtk web
    engine :
    
      - CVE-2020-3885
        Ryan Pickren discovered that a file URL may be
        incorrectly processed.
    
      - CVE-2020-3894
        Sergei Glazunov discovered that a race condition may
        allow an application to read restricted memory.
    
      - CVE-2020-3895
        grigoritchy discovered that processing maliciously
        crafted web content may lead to arbitrary code
        execution.
    
      - CVE-2020-3897
        Brendan Draper discovered that a remote attacker may be
        able to cause arbitrary code execution.
    
      - CVE-2020-3899
        OSS-Fuzz discovered that a remote attacker may be able
        to cause arbitrary code execution.
    
      - CVE-2020-3900
        Dongzhuo Zhao discovered that processing maliciously
        crafted web content may lead to arbitrary code
        execution.
    
      - CVE-2020-3901
        Benjamin Randazzo discovered that processing maliciously
        crafted web content may lead to arbitrary code
        execution.
    
      - CVE-2020-3902
        Yigit Can Yilmaz discovered that processing maliciously
        crafted web content may lead to a cross site scripting
        attack."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2020-3885"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2020-3894"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2020-3895"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2020-3897"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2020-3899"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2020-3900"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2020-3901"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2020-3902"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/source-package/webkit2gtk"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/buster/webkit2gtk"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2020/dsa-4681"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the webkit2gtk packages.
    
    For the stable distribution (buster), these problems have been fixed
    in version 2.28.2-2~deb10u1."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:webkit2gtk");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:10.0");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/04/01");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/05/07");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/05/08");
      script_set_attribute(attribute:"generated_plugin", value:"current");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"10.0", prefix:"gir1.2-javascriptcoregtk-4.0", reference:"2.28.2-2~deb10u1")) flag++;
    if (deb_check(release:"10.0", prefix:"gir1.2-webkit2-4.0", reference:"2.28.2-2~deb10u1")) flag++;
    if (deb_check(release:"10.0", prefix:"libjavascriptcoregtk-4.0-18", reference:"2.28.2-2~deb10u1")) flag++;
    if (deb_check(release:"10.0", prefix:"libjavascriptcoregtk-4.0-bin", reference:"2.28.2-2~deb10u1")) flag++;
    if (deb_check(release:"10.0", prefix:"libjavascriptcoregtk-4.0-dev", reference:"2.28.2-2~deb10u1")) flag++;
    if (deb_check(release:"10.0", prefix:"libwebkit2gtk-4.0-37", reference:"2.28.2-2~deb10u1")) flag++;
    if (deb_check(release:"10.0", prefix:"libwebkit2gtk-4.0-37-gtk2", reference:"2.28.2-2~deb10u1")) flag++;
    if (deb_check(release:"10.0", prefix:"libwebkit2gtk-4.0-dev", reference:"2.28.2-2~deb10u1")) flag++;
    if (deb_check(release:"10.0", prefix:"libwebkit2gtk-4.0-doc", reference:"2.28.2-2~deb10u1")) flag++;
    if (deb_check(release:"10.0", prefix:"webkit2gtk-driver", reference:"2.28.2-2~deb10u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyPeer-To-Peer File Sharing
    NASL idITUNES_12_10_5_BANNER.NASL
    descriptionThe version of Apple iTunes installed on the remote Windows host is prior to 12.10.5. It is, therefore, affected by multiple vulnerabilities as referenced in the HT211105 advisory. Note that Nessus has not tested for this issue but has instead relied only on the application
    last seen2020-04-30
    modified2020-03-31
    plugin id135031
    published2020-03-31
    reporterThis script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/135031
    titleApple iTunes < 12.10.5 Multiple Vulnerabilities (uncredentialed check) (HT211105)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(135031);
      script_version("1.3");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/04/24");
    
      script_cve_id(
        "CVE-2020-3885",
        "CVE-2020-3887",
        "CVE-2020-3894",
        "CVE-2020-3895",
        "CVE-2020-3897",
        "CVE-2020-3899",
        "CVE-2020-3900",
        "CVE-2020-3901",
        "CVE-2020-3902",
        "CVE-2020-3909",
        "CVE-2020-3910",
        "CVE-2020-3911",
        "CVE-2020-9783"
      );
      script_xref(name:"APPLE-SA", value:"HT211105");
      script_xref(name:"APPLE-SA", value:"APPLE-SA-2020-03-20");
    
      script_name(english:"Apple iTunes < 12.10.5 Multiple Vulnerabilities (uncredentialed check) (HT211105)");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application installed on the remote host is affected by multiple vulnerabilities");
      script_set_attribute(attribute:"description", value:
    "The version of Apple iTunes installed on the remote Windows host is prior to 12.10.5. It is, therefore, affected by
    multiple vulnerabilities as referenced in the HT211105 advisory. Note that Nessus has not tested for this issue but has
    instead relied only on the application's self-reported version number.
    
      - A buffer overflow issue in libxm12 had issues with size validation and buffer overflow. 
        (CVE-2020-3910, CVE-2020-3909, CVE-2020-3911)
    
      - A type confusion issue in WebKit could lead to the execution of malicious crafted code 
        (CVE-2020-3901)
    
      - A Memory corruption issue in WebKit could cause a arbitary code execution vulnerability 
        (CVE-2020-3895, CVE-2020-3900)
    
       Additional vulnerabilities are detailed HT211105 in the advisory.");
      script_set_attribute(attribute:"see_also", value:"https://support.apple.com/en-us/HT211105");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Apple iTunes version 12.10.5 or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-3900");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"patch_publication_date", value:"2020/03/20");
      script_set_attribute(attribute:"plugin_publication_date", value:"2020/03/31");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:itunes");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Peer-To-Peer File Sharing");
    
      script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("itunes_sharing.nasl");
      script_require_keys("installed_sw/iTunes DAAP");
      script_require_ports("Services/www", 3689);
    
      exit(0);
    }
    include('http.inc');
    include('vcf.inc');
    
    app = 'iTunes DAAP';
    port = get_http_port(default:3689, embedded:TRUE, ignore_broken:TRUE);
    
    app_info = vcf::get_app_info(app:app, port:port);
    if (app_info.Type != 'Windows') audit(AUDIT_OS_NOT, 'Windows');
    constraints = [{'fixed_version':'12.10.5'}];
    vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
    

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/157378/GS20200423195409.txt
idPACKETSTORM:157378
last seen2020-04-25
published2020-04-23
reporterGoogle Security Research
sourcehttps://packetstormsecurity.com/files/157378/WebKit-AudioArray-allocate-Data-Race-Out-Of-Bounds-Access.html
titleWebKit AudioArray::allocate Data Race / Out-Of-Bounds Access