A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. A remote attacker may be able to cause arbitrary code execution.
Recent assessments:
timwr at September 04, 2020 9:14am UTC reported:
This exploit was used in pwn2own2020 and the exploit code is readily available.
Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 4
lists.opensuse.org/opensuse-security-announce/2020-07/msg00074.html
packetstormsecurity.com/files/159447/Safari-Type-Confusion-Sandbox-Escape.html
www.openwall.com/lists/oss-security/2020/07/10/1
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
lists.fedoraproject.org/archives/list/[email protected]/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM
lists.fedoraproject.org/archives/list/[email protected]/message/GER2ATKZXDHM7FFYJH67ZPNZZX5VOUVM/
lists.fedoraproject.org/archives/list/[email protected]/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR
lists.fedoraproject.org/archives/list/[email protected]/message/JDBXQ2XA6X4DP4YTPXBOMKSLWUED2KAR/
security.gentoo.org/glsa/202007-11
support.apple.com/HT211168
support.apple.com/HT211171
support.apple.com/HT211175
support.apple.com/HT211177
support.apple.com/HT211178
support.apple.com/HT211179
support.apple.com/HT211181
usn.ubuntu.com/4422-1
usn.ubuntu.com/4422-1/
www.debian.org/security/2020/dsa-4724