Apple iOS、Safari和tvOS WebKit 内存损坏漏洞

admin 2022-07-25 16:53:09 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS、Safari和tvOS WebKit 内存损坏漏洞

  • CNNVD编号:CNNVD-201607-851
  • 危害等级: 高危
  • CVE编号: CVE-2016-4589
  • 漏洞类型: 缓冲区错误
  • 发布时间: 2016-07-26
  • 威胁类型: 远程
  • 更新时间: 2019-03-13
  • 厂        商: CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple
  • 漏洞来源:

漏洞简介

CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS、Safari和tvOS都是美国苹果(CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple)公司的产品。CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS是为移动设备所开发的一套操作系统;Safari是一款Web浏览器,是Mac OS X和iOS操作系统附带的默认浏览器;tvOS是一套智能电视操作系统。WebKit是KDE社区开发的一套开源Web浏览器引擎,目前被CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple Safari及Google CMS.zone.ci/e/tags/htag.php?tag=Chrome target=_blank class=infotextkey>Chrome等浏览器使用。

CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS 9.3.3之前版本、Safari 9.1.2之前版本和tvOS 9.2.2之前版本中的WebKit中存在安全漏洞。远程攻击者可借助特制的网站利用该漏洞执行任意代码,或造成拒绝服务(内存损坏)。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206905

https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206902

https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206900

参考网址

来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple

链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2016/Jul/msg00003.HTML

来源:CONFIRM

链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206905

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/539295/100/0/threaded

来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple

链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2016/Jul/msg00004.HTML

来源:SECTRACK

链接:http://www.securitytracker.com/id/1036343

来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple

链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2016/Jul/msg00001.HTML

来源:BID

链接:http://www.securityfocus.com/bid/91830

来源:MISC

链接:http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.HTML

来源:CONFIRM

链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206900

来源:CONFIRM

链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206902

受影响实体

  • CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple Webkit  

补丁

  • CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS、Safari和tvOS WebKit 内存损坏漏洞的修复措施

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0