Alert GCSA-20046 - Apple Multiple Security Updates
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-20046
Data: 3 Giugno 2020
Titolo: Apple Multiple Security Updates
******************************************************************
Apple ha rilasciato degli aggiornamenti di sicurezza che risolvono delle
vulnerabilita' presenti nei sistemi operativi e nelle applicazioni.
Per una descrizione degli aggiornamenti consultare le segnalazioni
ufficiali alla sezione 'Riferimenti'.
:: Piattaforme e Software interessati
macOS Catalina 10.15.5 e versioni precedenti
macOS High Sierra 10.13.6 e versioni precedenti
macOS Mojave 10.14.6 e versioni precedenti
Safari versioni precedenti alla 13.1.1
Windows Migration Assistant 2.2.0.0
iCloud for Windows 11.2
iCloud for Windows 7.19
iTunes versione 12.10.7
tvOS versione 13.4.6
watchOS versione 6.2.6
iOS versione 13.5.1
iPadOS versione 13.5.1
:: Impatto
Cross-Site Scripting
Denial of Service
Elevation of Privilege
Remote Code Execution
Security Restriction Bypass
Information Disclosure
:: Soluzione
Applicare gli aggiornamenti disponibili, se non gia' abilitati
automaticamente come configurazione predefinita.
:: Riferimenti
Apple security updates
https://support.apple.com/it-it/HT201222
https://support.apple.com/en-us/HT211170
https://support.apple.com/en-us/HT211215
https://support.apple.com/en-us/HT211186
https://support.apple.com/it-it/HT211177
https://support.apple.com/it-it/HT211179
https://support.apple.com/it-it/HT211181
https://support.apple.com/en-us/HT211216
https://support.apple.com/en-us/HT211217
https://support.apple.com/en-us/HT211214
US-CERT
https://www.us-cert.gov/ncas/current-activity/2020/05/27/apple-releases-security-updates
https://www.us-cert.gov/ncas/current-activity/2020/06/02/apple-releases-security-updates
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
GARR CERT Newsletter subscribe/unsubscribe:
https://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCXtdgSAAKCRDBnEyTZRJg
QpN3AJ9eNSHrZuLXqcjlgFrTKjNRV7ZbVACfTdWzfyySEY4EdLZEZD+ljZctA7s=
=xBKS
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
Alert ID: GCSA-20046
Data: 3 Giugno 2020
Titolo: Apple Multiple Security Updates
******************************************************************
Apple ha rilasciato degli aggiornamenti di sicurezza che risolvono delle
vulnerabilita' presenti nei sistemi operativi e nelle applicazioni.
Per una descrizione degli aggiornamenti consultare le segnalazioni
ufficiali alla sezione 'Riferimenti'.
:: Piattaforme e Software interessati
macOS Catalina 10.15.5 e versioni precedenti
macOS High Sierra 10.13.6 e versioni precedenti
macOS Mojave 10.14.6 e versioni precedenti
Safari versioni precedenti alla 13.1.1
Windows Migration Assistant 2.2.0.0
iCloud for Windows 11.2
iCloud for Windows 7.19
iTunes versione 12.10.7
tvOS versione 13.4.6
watchOS versione 6.2.6
iOS versione 13.5.1
iPadOS versione 13.5.1
:: Impatto
Cross-Site Scripting
Denial of Service
Elevation of Privilege
Remote Code Execution
Security Restriction Bypass
Information Disclosure
:: Soluzione
Applicare gli aggiornamenti disponibili, se non gia' abilitati
automaticamente come configurazione predefinita.
:: Riferimenti
Apple security updates
https://support.apple.com/it-it/HT201222
https://support.apple.com/en-us/HT211170
https://support.apple.com/en-us/HT211215
https://support.apple.com/en-us/HT211186
https://support.apple.com/it-it/HT211177
https://support.apple.com/it-it/HT211179
https://support.apple.com/it-it/HT211181
https://support.apple.com/en-us/HT211216
https://support.apple.com/en-us/HT211217
https://support.apple.com/en-us/HT211214
US-CERT
https://www.us-cert.gov/ncas/current-activity/2020/05/27/apple-releases-security-updates
https://www.us-cert.gov/ncas/current-activity/2020/06/02/apple-releases-security-updates
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3878
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9771
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9772
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9788
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9789
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9790
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9791
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9792
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9793
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9794
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9795
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9797
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9801
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9804
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9808
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9809
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9811
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9813
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9822
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9824
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9825
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9826
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9827
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9828
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9830
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9831
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9832
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9834
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9837
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9839
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9841
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9842
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9844
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9855
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9856
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9857
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9858
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14868
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20044
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503
GARR CERT Newsletter subscribe/unsubscribe:
https://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCXtdgSAAKCRDBnEyTZRJg
QpN3AJ9eNSHrZuLXqcjlgFrTKjNRV7ZbVACfTdWzfyySEY4EdLZEZD+ljZctA7s=
=xBKS
-----END PGP SIGNATURE-----