漏洞信息详情
多款CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple产品WebKit 缓冲区溢出漏洞
- CNNVD编号:CNNVD-201512-380
- 危害等级: 中危
- CVE编号: CVE-2015-7100
- 漏洞类型: 缓冲区错误
- 发布时间: 2015-12-14
- 威胁类型: 远程
- 更新时间: 2019-03-13
- 厂 商: CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple
- 漏洞来源:
漏洞简介
CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS、Safari和tvOS都是美国苹果(CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple)公司的产品。CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS是为移动设备所开发的一套操作系统;Safari是一款Web浏览器,是Mac OS X和iOS操作系统附带的默认浏览器;tvOS是一套智能电视操作系统。WebKit是KDE社区开发的一套开源Web浏览器引擎,目前被CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple Safari及Google CMS.zone.ci/e/tags/htag.php?tag=Chrome target=_blank class=infotextkey>Chrome等浏览器使用。
多款CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple产品的WebKit中存在安全漏洞。远程攻击者可借助特制的Web站点利用该漏洞执行任意代码,或造成拒绝服务(内存损坏和应用程序崩溃)。以下产品及版本受到影响:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iOS 9.1及之前版本,Safari 9.0.1及之前版本,tvOS 9.0及之前版本。
漏洞公告
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT205635
https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT205639
https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT205640
参考网址
来源:CONFIRM
链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT205639
来源:SUSE
链接:http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.HTML
来源:CONFIRM
链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT205640
来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple
链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2015/Dec/msg00001.HTML
来源:SECTRACK
链接:http://www.securitytracker.com/id/1034341
来源:CONFIRM
链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/kb/HT205636
来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple
链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2015/Dec/msg00000.HTML
来源:BID
链接:http://www.securityfocus.com/bid/78726
来源:CONFIRM
链接:https://support.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/HT205635
来源:CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple
链接:http://lists.CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple.com/archives/security-announce/2015/Dec/msg00003.HTML
受影响实体
- CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple Safari:9.0.1
- CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple_tv:9.0
- CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple iPhone_os:9.1
补丁
- 多款CMS.zone.ci/e/tags/htag.php?tag=Apple target=_blank class=infotextkey>Apple产品WebKit 缓冲区溢出漏洞的修复措施
评论