CNVD-2017-05617

Vulnerability from cnvd - Published: 2017-04-29
VLAI Severity ?
Title
多款Apple产品WebKit组件内存破坏漏洞(CNVD-2017-05617)
Description
AppleiOS、Safari和tvOS都是美国苹果(Apple)公司的产品。AppleiOS是为移动设备所开发的一套操作系统;AppleSafari是一款Web浏览器,是MacOSX和iOS操作系统附带的默认浏览器。WebKit是KDE、苹果(Apple)、谷歌(Google)等公司共同开发的一套开源Web浏览器引擎,目前被AppleSafari及GoogleChrome等浏览器使用。 多款Apple产品中的WebKit组件中存在内存破坏漏洞。远程攻击者可利用该漏洞借助特制的Web站点执行任意代码或造成拒绝服务(内存破坏和应用程序崩溃)。
Severity
Patch Name
多款Apple产品WebKit组件内存破坏漏洞(CNVD-2017-05617)的补丁
Patch Description
AppleiOS、Safari和tvOS都是美国苹果(Apple)公司的产品。AppleiOS是为移动设备所开发的一套操作系统;AppleSafari是一款Web浏览器,是MacOSX和iOS操作系统附带的默认浏览器。WebKit是KDE、苹果(Apple)、谷歌(Google)等公司共同开发的一套开源Web浏览器引擎,目前被AppleSafari及GoogleChrome等浏览器使用。 多款Apple产品中的WebKit组件中存在内存破坏漏洞。远程攻击者可利用该漏洞借助特制的Web站点执行任意代码或造成拒绝服务(内存破坏和应用程序崩溃)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下厂商提供的安全补丁以修复该漏洞: https://support.apple.com/zh-cn/HT207600 https://support.apple.com/zh-cn/HT207601 https://support.apple.com/zh-cn/HT207617

Reference
http://www.securityfocus.com/bid/97130 https://nvd.nist.gov/vuln/detail/CVE-2017-2476
Impacted products
Name
['Apple Safari <10.1', 'Apple tvOS <10.2', 'Apple IOS <10.3']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "97130"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-2476"
    }
  },
  "description": "AppleiOS\u3001Safari\u548ctvOS\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002AppleiOS\u662f\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\uff1bAppleSafari\u662f\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\uff0c\u662fMacOSX\u548ciOS\u64cd\u4f5c\u7cfb\u7edf\u9644\u5e26\u7684\u9ed8\u8ba4\u6d4f\u89c8\u5668\u3002WebKit\u662fKDE\u3001\u82f9\u679c\uff08Apple\uff09\u3001\u8c37\u6b4c\uff08Google\uff09\u7b49\u516c\u53f8\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u5f00\u6e90Web\u6d4f\u89c8\u5668\u5f15\u64ce\uff0c\u76ee\u524d\u88abAppleSafari\u53caGoogleChrome\u7b49\u6d4f\u89c8\u5668\u4f7f\u7528\u3002\r\n\r\n\u591a\u6b3eApple\u4ea7\u54c1\u4e2d\u7684WebKit\u7ec4\u4ef6\u4e2d\u5b58\u5728\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u501f\u52a9\u7279\u5236\u7684Web\u7ad9\u70b9\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5185\u5b58\u7834\u574f\u548c\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff09\u3002",
  "discovererName": "lokihardt of Google Project Zero, Andr\u0026eacute; Bargull, Apple, Ivan Fratric of Google Project Zero, Natalie Silvanovich of Google Project Zero, Jeonghoon Shin, Zheng Huang and Wei Yuan of Baidu Security Lab, 0011 working with Trend Micro\u0027s Zero Day Initiat",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://support.apple.com/zh-cn/HT207600\r\nhttps://support.apple.com/zh-cn/HT207601\r\nhttps://support.apple.com/zh-cn/HT207617",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-05617",
  "openTime": "2017-04-29",
  "patchDescription": "AppleiOS\u3001Safari\u548ctvOS\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002AppleiOS\u662f\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\uff1bAppleSafari\u662f\u4e00\u6b3eWeb\u6d4f\u89c8\u5668\uff0c\u662fMacOSX\u548ciOS\u64cd\u4f5c\u7cfb\u7edf\u9644\u5e26\u7684\u9ed8\u8ba4\u6d4f\u89c8\u5668\u3002WebKit\u662fKDE\u3001\u82f9\u679c\uff08Apple\uff09\u3001\u8c37\u6b4c\uff08Google\uff09\u7b49\u516c\u53f8\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u5f00\u6e90Web\u6d4f\u89c8\u5668\u5f15\u64ce\uff0c\u76ee\u524d\u88abAppleSafari\u53caGoogleChrome\u7b49\u6d4f\u89c8\u5668\u4f7f\u7528\u3002\r\n\r\n\u591a\u6b3eApple\u4ea7\u54c1\u4e2d\u7684WebKit\u7ec4\u4ef6\u4e2d\u5b58\u5728\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u501f\u52a9\u7279\u5236\u7684Web\u7ad9\u70b9\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6216\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5185\u5b58\u7834\u574f\u548c\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eApple\u4ea7\u54c1WebKit\u7ec4\u4ef6\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff08CNVD-2017-05617\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Apple  Safari \u003c10.1",
      "Apple tvOS \u003c10.2",
      "Apple IOS \u003c10.3"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/97130\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-2476",
  "serverity": "\u4e2d",
  "submitTime": "2017-04-08",
  "title": "\u591a\u6b3eApple\u4ea7\u54c1WebKit\u7ec4\u4ef6\u5185\u5b58\u7834\u574f\u6f0f\u6d1e\uff08CNVD-2017-05617\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…