CNVD-2015-06083
Vulnerability from cnvd - Published: 2015-09-22
VLAI Severity ?
Title
Apple iOS敏感用户信息泄露漏洞
Description
Apple iOS是一款运行在苹果iPhone和iPod touch设备上的最新的操作系统。
Apple iOS存在安全漏洞,恶意应用可访问后台程序中的屏幕帧缓存区信息,可获取敏感用户信息。
Severity
中
Patch Name
Apple iOS敏感用户信息泄露漏洞的补丁
Patch Description
Apple iOS是一款运行在苹果iPhone和iPod touch设备上的最新的操作系统。
Apple iOS存在安全漏洞,恶意应用可访问后台程序中的屏幕帧缓存区信息,可获取敏感用户信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
Apple iOS 9.0已经修复该漏洞,建议用户下载更新: https://support.apple.com/
Reference
https://support.apple.com/en-us/HT205212
Impacted products
| Name | Apple IOS < 9.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2015-5880"
}
},
"description": "Apple iOS\u662f\u4e00\u6b3e\u8fd0\u884c\u5728\u82f9\u679ciPhone\u548ciPod touch\u8bbe\u5907\u4e0a\u7684\u6700\u65b0\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nApple iOS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u6076\u610f\u5e94\u7528\u53ef\u8bbf\u95ee\u540e\u53f0\u7a0b\u5e8f\u4e2d\u7684\u5c4f\u5e55\u5e27\u7f13\u5b58\u533a\u4fe1\u606f\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u7528\u6237\u4fe1\u606f\u3002",
"discovererName": "Jin Han, Su Mon Kywe, Qiang Yan, Robert Deng, Debin Gao, Yingjiu Li of School of Information Systems Singapore Management University, Feng Bao and Jianying Zhou of Cryptography and Security Department Institute for Infocomm Research",
"formalWay": "Apple iOS 9.0\u5df2\u7ecf\u4fee\u590d\u8be5\u6f0f\u6d1e\uff0c\u5efa\u8bae\u7528\u6237\u4e0b\u8f7d\u66f4\u65b0\uff1a\r\nhttps://support.apple.com/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2015-06083",
"openTime": "2015-09-22",
"patchDescription": "Apple iOS\u662f\u4e00\u6b3e\u8fd0\u884c\u5728\u82f9\u679ciPhone\u548ciPod touch\u8bbe\u5907\u4e0a\u7684\u6700\u65b0\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002 \r\n\r\nApple iOS\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u6076\u610f\u5e94\u7528\u53ef\u8bbf\u95ee\u540e\u53f0\u7a0b\u5e8f\u4e2d\u7684\u5c4f\u5e55\u5e27\u7f13\u5b58\u533a\u4fe1\u606f\uff0c\u53ef\u83b7\u53d6\u654f\u611f\u7528\u6237\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apple iOS\u654f\u611f\u7528\u6237\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Apple IOS \u003c 9.0"
},
"referenceLink": "https://support.apple.com/en-us/HT205212",
"serverity": "\u4e2d",
"submitTime": "2015-09-20",
"title": "Apple iOS\u654f\u611f\u7528\u6237\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…