Ministero dello Sviluppo Economico

CERT Nazionale Italia - Computer Emergency Response Team

Vulnerabilità

Aggiornamenti di sicurezza per prodotti Apple (24 marzo 2020)

apple  iCloud  iTunes  Safari  Xcode   giovedì, 26 marzo 2020

Apple ha rilasciato aggiornamenti di sicurezza che risolvono diverse vulnerabilità in macOS, iOS, iPadOS, tvOS, watchOS, Safari, iTunes e iCloud per Windows, Xcode.

Apple macOS è un sistema operativo per i computer Mac. Apple iOS è un sistema operativo per iPhone e iPod touch. Apple iPadOS è un sistema operativo per iPad basato su iOS. Apple tvOS è il sistema operativo per Apple TV. Apple watchOS è il sistema operativo per Apple Watch. Safari è un browser Web disponibile per macOS e Microsoft Windows. iTunes è un’applicazione per la gestione di file multimediali. iCloud è il sistema SaaS di Apple basato sul cloud computing. Xcode è uno strumento di sviluppo per la creazione di applicazioni iOS, watchOS, e tvOS.

L’aggiornamento per macOS contiene diversi fix di sicurezza che risolvono numerose vulnerabilità, di cui alcune di gravità elevata, in macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS Catalina 10.15.3. Lo sfruttamento delle più gravi tra queste vulnerabilità potrebbe consentire ad un attaccante di accedere ad aree di memoria protette, ottenere privilegi elevati, eseguire codice arbitrario sul sistema o provocare condizioni di denial of service.

Dettagli delle vulnerabilità risolte in macOS (in Inglese):

  • Apple HSSPI Support: a memory corruption issue may allow an application may to execute arbitrary code with system privileges (CVE-2020-3903).
  • AppleGraphicsControl: multiple memory corruption issues may allow a malicious application to execute arbitrary code with kernel privileges (CVE-2020-3904).
  • AppleMobileFileIntegrity: an application may be able to use arbitrary entitlements (CVE-2020-3883).
  • Bluetooth: an out-of-bounds read issue may allow a local user to cause unexpected system termination or read kernel memory (CVE-2020-3907, CVE-2020-3908, CVE-2020-3912).
  • Bluetooth: a memory corruption issue may allow a malicious application to execute arbitrary code with kernel privileges (CVE-2020-3892, CVE-2020-3893, CVE-2020-3905).
  • Bluetooth: a validation issue may allow an application to read restricted memory (CVE-2019-8853).
  • Call History: a permissions issue may allow a malicious application to elevate privileges (CVE-2020-3913).
  • FaceTime: a logic issue may allow a local user to view sensitive user information (CVE-2020-3881).
  • Icons: a malicious application may be able to identify what other applications a user has installed (CVE-2020-9773).
  • Intel Graphics Driver: an information disclosure issue may allow a malicious application to disclose restricted memory (CVE-2019-14615).
  • IOHIDFamily: a memory initialization issue may allow a malicious application to execute arbitrary code with kernel privileges (CVE-2020-3919).
  • IOThunderboltFamily: a use after free issue may allow an application to gain elevated privileges (CVE-2020-3851).
  • Kernel: a memory initialization issue may allow an application to read restricted memory (CVE-2020-3914).
  • Kernel: multiple memory corruption issues may allow a malicious application to execute arbitrary code with kernel privileges (CVE-2020-9785).
  • libxml2: multiple issues in libxml2 (CVE-2020-3909, CVE-2020-3910, CVE-2020-3911).
  • Mail: an injection issue may allow a remote attacker to cause arbitrary javascript code execution (CVE-2020-3884).
  • sudo: an attacker may be able to run commands as a non-existent user (CVE-2019-19232).
  • TCC: a logic issue may allow a maliciously crafted application to bypass code signing enforcement (CVE-2020-3906).
  • Time Machine: a logic issue may allow a local user to read arbitrary files (CVE-2020-3889).
  • Vim: multiple issues in Vim.

L’aggiornamento per iOS e iPadOS, disponibile per iPhone 6s e successivo, iPad Air 2 e successivo, iPad mini 4 e successivo e iPod touch 7a generazione, contiene diversi fix di sicurezza che risolvono diverse gravi vulnerabilità che potrebbero consentire ad un attaccante di accedere ad aree di memoria protette, elevare i propri privilegi, eseguire codice arbitrario sul sistema o provocare condizioni di denial of service.

Dettagli delle vulnerabilità risolte in iOS e iPadOS (in Inglese):

  • ActionKit: an application may be able to use an SSH client provided by private frameworks (CVE-2020-3917).
  • AppleMobileFileIntegrity: an application may be able to use arbitrary entitlements (CVE-2020-3883).
  • Bluetooth: a logic issue may allow an attacker in a privileged network position to intercept Bluetooth traffic (CVE-2020-9770).
  • CoreFoundation: a permissions issue may allow a malicious application to elevate privileges (CVE-2020-3913).
  • Icons: setting an alternate app icon may disclose a photo without needing permission to access photos (CVE-2020-3916).
  • Icons: a malicious application may be able to identify what other applications a user has installed (CVE-2020-9773).
  • Image Processing: a use after free issue may allow an application to execute arbitrary code with system privileges (CVE-2020-9768).
  • IOHIDFamily: a memory initialization issue may allow a malicious application to execute arbitrary code with kernel privileges (CVE-2020-3919).
  • Kernel: a memory initialization issue may allow an application to read restricted memory (CVE-2020-3914).
  • Kernel: multiple memory corruption issues may allow a malicious application to execute arbitrary code with kernel privileges (CVE-2020-9785).
  • libxml2: multiple issues in libxml2 (CVE-2020-3909, CVE-2020-3910, CVE-2020-3911).
  • Mail: a local user may be able to view deleted content in the app switcher (CVE-2020-9780).
  • Mail Attachments: cropped videos may not be shared properly via Mail (CVE-2020-9777).
  • Messages: a logic issue may allow a person with physical access to a locked iOS device to respond to messages even when replies are disabled (CVE-2020-3891).
  • Messages Composition: deleted messages groups may still be suggested as an autocompletion (CVE-2020-3890).
  • Safari: a user’s private browsing activity may be unexpectedly saved in Screen Time (CVE-2020-9775).
  • Safari: a user may grant website permissions to a site they didn’t intend to (CVE-2020-9781).
  • Web App: a logic issue may cause a maliciously crafted page to interfere with other web contexts (CVE-2020-3888).
  • WebKit: a race condition issue may allow an application to read restricted memory (CVE-2020-3894).
  • WebKit: a memory consumption issue may allow a remote attacker to cause arbitrary code execution (CVE-2020-3899).
  • WebKit: an input validation issue may lead to a cross site scripting attack processing maliciously crafted web content (CVE-2020-3902).
  • WebKit: a memory corruption issue may lead to arbitrary code execution processing maliciously crafted web content (CVE-2020-3895, CVE-2020-3900).
  • WebKit: a type confusion issue may cause a download’s origin to be incorrectly associated (CVE-2020-3887).
  • WebKit: a use after free issue may allow a remote attacker to cause arbitrary code execution (CVE-2020-3897).
  • WebKit Page Loading: a logic issue may cause a file URL to be incorrectly processed (CVE-2020-3885).

Si raccomanda di scaricare ed applicare gli aggiornamenti di sicurezza messi a disposizione da Apple il più presto possibile.

Per maggiori informazioni sui prodotti vulnerabili e sugli aggiornamenti disponibili è possibile consultare i seguenti bollettini di sicurezza di Apple (in Inglese):

Notizie correlate

Aggiornamenti di sicurezza per prodotti Apple (28 gennaio 2020)

29 gennaio 2020

Apple ha rilasciato aggiornamenti di sicurezza che risolvono diverse vulnerabilità in macOS, iOS, iPadOS, tvOS, watchOS, Safari e iTunes per Windows.Leggi tutto

Aggiornamenti di sicurezza per prodotti Apple (10-11 dicembre 2019)

12 dicembre 2019

Apple ha rilasciato aggiornamenti di sicurezza che risolvono diverse vulnerabilità in macOS, iOS, iPadOS, tvOS, watchOS, Safari, Xcode, iTunes per Windows e iCloud per Windows.Leggi tutto

Aggiornamenti di sicurezza per prodotti Apple (29 ottobre 2019)

30 ottobre 2019

Apple ha rilasciato aggiornamenti di sicurezza che risolvono diverse vulnerabilità in macOS, iOS, iPadOS, tvOS, watchOS e Safari.Leggi tutto