CNVD-2017-05790

Vulnerability from cnvd - Published: 2017-05-02
VLAI Severity ?
Title
Apple macOS Sierra System Integrity Protection输入验证漏洞
Description
Apple macOS Sierra是美国苹果(Apple)公司专为Mac计算机所开发的一套操作系统。System Integrity Protection是其中的一个系统完整性保护组件。 Apple macOS Sierra 10.12.4之前的版本中的System Integrity Protection组件存在输入验证漏洞。攻击者可借助特制的应用程序利用该漏洞修改受保护磁盘的位置。
Severity
Patch Name
Apple macOS Sierra System Integrity Protection输入验证漏洞的补丁
Patch Description
Apple macOS Sierra是美国苹果(Apple)公司专为Mac计算机所开发的一套操作系统。System Integrity Protection是其中的一个系统完整性保护组件。 Apple macOS Sierra 10.12.4之前的版本中的System Integrity Protection组件存在输入验证漏洞。攻击者可借助特制的应用程序利用该漏洞修改受保护磁盘的位置。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下厂商提供的安全补丁以修复该漏洞: https://support.apple.com/zh-cn/HT207615

Reference
http://www.securityfocus.com/bid/97140 https://nvd.nist.gov/vuln/detail/CVE-2017-6974
Impacted products
Name
Apple MacOS <10.12.4
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "97140"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-6974",
      "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6974"
    }
  },
  "description": "Apple macOS Sierra\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\u3002System Integrity Protection\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7cfb\u7edf\u5b8c\u6574\u6027\u4fdd\u62a4\u7ec4\u4ef6\u3002\r\n\r\nApple macOS Sierra 10.12.4\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684System Integrity Protection\u7ec4\u4ef6\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u4fee\u6539\u53d7\u4fdd\u62a4\u78c1\u76d8\u7684\u4f4d\u7f6e\u3002",
  "discovererName": "Ulf Frisk, Apple, Brandon Azad, an anonymous researcher, Max Bazaliy, beist, Sergey Bylokhov, Simon Huang, pjf, Alex Fishman, Izik Eidus, Pekka Oikarainen, Matias Karhumaa, Marko Laakso, @cocoahuke, kimyok, Craig Arendt, Axis, sss, Orr A, Benjamin Gnahm, I",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://support.apple.com/zh-cn/HT207615",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-05790",
  "openTime": "2017-05-02",
  "patchDescription": "Apple macOS Sierra\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\u3002System Integrity Protection\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7cfb\u7edf\u5b8c\u6574\u6027\u4fdd\u62a4\u7ec4\u4ef6\u3002\r\n\r\nApple macOS Sierra 10.12.4\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684System Integrity Protection\u7ec4\u4ef6\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u4fee\u6539\u53d7\u4fdd\u62a4\u78c1\u76d8\u7684\u4f4d\u7f6e\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Apple macOS Sierra System Integrity Protection\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": "Apple MacOS \u003c10.12.4"
  },
  "referenceLink": "http://www.securityfocus.com/bid/97140\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-6974",
  "serverity": "\u4e2d",
  "submitTime": "2017-04-26",
  "title": "Apple macOS Sierra System Integrity Protection\u8f93\u5165\u9a8c\u8bc1\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…