[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] APPLE-SA-2021-04-26-8 iCloud for Windows 12.3
From:       Apple Product Security via Fulldisclosure <fulldisclosure () seclists ! org>
Date:       2021-04-26 22:51:52
Message-ID: A7522FAF-5A9F-41CC-91BF-5DB13804A18D () lists ! apple ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2021-04-26-8 iCloud for Windows 12.3

iCloud for Windows 12.3 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT212321.

CFNetwork
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may disclose
sensitive user information
Description: A memory initialization issue was addressed with
improved memory handling.
CVE-2021-1857: an anonymous researcher

CoreText
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing a maliciously crafted font may result in the
disclosure of process memory
Description: A logic issue was addressed with improved state
management.
CVE-2021-1811: Xingwei Lin of Ant Security Light-Year Lab

WebKit
Available for: Windows 10 and later via the Microsoft Store
Impact: Processing maliciously crafted web content may lead to a
cross site scripting attack
Description: An input validation issue was addressed with improved
input validation.
CVE-2021-1825: Alex Camboe of Aon's Cyber Solutions

WebRTC
Available for: Windows 10 and later via the Microsoft Store
Impact: A remote attacker may be able to cause unexpected system
termination or corrupt kernel memory
Description: A use after free issue was addressed with improved
memory management.
CVE-2020-7463: Megan2013678

Additional recognition

CoreCrypto
We would like to acknowledge Andy Russon of Orange Group for their
assistance.

Installation note:

This update may be obtained from:
https://support.apple.com/en-us/HT201391

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
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=3JfX
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic