Apple iOS、watchOS、OS X El Capitan和tvOS libxml2 缓冲区错误漏洞

admin 2022-07-26 05:31:51 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS、watchOS、OS X El Capitan和tvOS libxml2 缓冲区错误漏洞

  • CNNVD编号:CNNVD-201605-478
  • 危害等级: 高危
  • CVE编号: CVE-2016-1840
  • 漏洞类型: 缓冲区错误
  • 发布时间: 2016-05-20
  • 威胁类型: 本地
  • 更新时间: 2020-07-10
  • 厂        商: CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple
  • 漏洞来源:

漏洞简介

CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS、watchOS、OS X El Capitan和tvOS都是美国苹果(CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple)公司的产品。CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS是为移动设备所开发的一套操作系统;watchOS是一套智能手表操作系统;OS X El Capitan是为Mac计算机所开发的一套专用操作系统;tvOS是一套智能电视操作系统。Libxml2是GNOME项目组所研发的一个基于C语言的用来解析XML文档的函数库,它支持多种编码格式、Xpath解析、Well-formed和valid验证等。

CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS 9.3.2之前版本、watchOS 2.2.1之前版本、OS X El Capitan 10.11.5之前版本和tvOS 9.2.1之前版本的libxml2中存在安全漏洞。远程攻击者可借助特制的XML利用该漏洞造成拒绝服务(内存损坏)或执行任意代码。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/en-au/HT206564

https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/en-au/HT206568

https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/en-au/HT206566

https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/en-au/HT206567

参考网址

来源:BID

链接:http://www.securityfocus.com/bid/90691

来源:CONFIRM

链接:https://bugzilla.gnome.org/show_bug.cgi?id=757711

来源:CONFIRM

链接:http://xmlsoft.org/news.HTML

来源:CONFIRM

链接:https://git.gnome.org/browse/libxml2/commit/?id=cbb271655cadeb8dbb258a64701d9a3a0c4835b4

来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple

链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2016/May/msg00002.HTML

来源:DEBIAN

链接:https://www.debian.org/security/2016/dsa-3593

来源:CONFIRM

链接:https://www.tenable.com/security/tns-2016-18

来源:CONFIRM

链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206564

来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple

链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2016/May/msg00003.HTML

来源:CONFIRM

链接:http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.HTML

来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple

链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2016/May/msg00004.HTML

来源:REDHAT

链接:http://rhn.redhat.com/errata/RHSA-2016-2957.HTML

来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple

链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2016/May/msg00001.HTML

来源:UBUNTU

链接:http://www.ubuntu.com/usn/USN-2994-1

来源:CONFIRM

链接:http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.HTML

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2016:1292

来源:CONFIRM

链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206566

来源:CONFIRM

链接:http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.HTML

来源:CONFIRM

链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206567

来源:CONFIRM

链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT206568

来源:CONFIRM

链接:https://kc.mcafee.com/corporate/index?page=content&id=SB10170

来源:SECTRACK

链接:http://www.securitytracker.com/id/1035890

来源:GENTOO

链接:https://security.gentoo.org/glsa/201701-37

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2340/

受影响实体

  • CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple_tv:9.2  

补丁

  • CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS、watchOS、OS X El Capitan和tvOS libxml2 安全漏洞的修复措施

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0