CNVD-2018-02629

Vulnerability from cnvd - Published: 2018-02-02
VLAI Severity ?
Title
多款Apple产品Security组件存在未明漏洞(CNVD-2018-02629)
Description
Apple iOS、macOS High Sierra、tvOS和watchOS都是美国苹果(Apple)公司的产品。Apple iOS是为移动设备所开发的一套操作系统;macOS High Sierra是一套专为Mac计算机所开发的专用操作系统;tvOS是一套智能电视操作系统;watchOS是一套智能手表操作系统。Security是其中的一个信息安全和隐私保护的组件。 多款Apple产品中的Security组件存在安全漏洞。远程攻击者可利用该漏洞使设备无法正确的对证书使用名称限制。
Severity
Patch Name
多款Apple产品Security组件存在未明漏洞(CNVD-2018-02629)的补丁
Patch Description
Apple iOS、macOS High Sierra、tvOS和watchOS都是美国苹果(Apple)公司的产品。Apple iOS是为移动设备所开发的一套操作系统;macOS High Sierra是一套专为Mac计算机所开发的专用操作系统;tvOS是一套智能电视操作系统;watchOS是一套智能手表操作系统。Security是其中的一个信息安全和隐私保护的组件。 多款Apple产品中的Security组件存在安全漏洞。远程攻击者可利用该漏洞使设备无法正确的对证书使用名称限制。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://support.apple.com/zh-cn/HT208464

Reference
https://support.apple.com/zh-cn/HT208464 http://www.securityfocus.com/bid/102782
Impacted products
Name
['Apple tvOS <11.2.5', 'Apple macOS High Sierra <10.13.3', 'Apple IOS <11.2.5', 'Apple watchOS <4.2.2']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "102782"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2018-4086"
    }
  },
  "description": "Apple iOS\u3001macOS High Sierra\u3001tvOS\u548cwatchOS\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Apple iOS\u662f\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\uff1bmacOS High Sierra\u662f\u4e00\u5957\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\uff1btvOS\u662f\u4e00\u5957\u667a\u80fd\u7535\u89c6\u64cd\u4f5c\u7cfb\u7edf\uff1bwatchOS\u662f\u4e00\u5957\u667a\u80fd\u624b\u8868\u64cd\u4f5c\u7cfb\u7edf\u3002Security\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4fe1\u606f\u5b89\u5168\u548c\u9690\u79c1\u4fdd\u62a4\u7684\u7ec4\u4ef6\u3002\r\n\r\n\u591a\u6b3eApple\u4ea7\u54c1\u4e2d\u7684Security\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f7f\u8bbe\u5907\u65e0\u6cd5\u6b63\u786e\u7684\u5bf9\u8bc1\u4e66\u4f7f\u7528\u540d\u79f0\u9650\u5236\u3002",
  "discovererName": "Mingi Cho, MinSik Shin, Seoyoung Kim, Yeongho Lee and Taekyoung Kwon of the Information Security Lab, Yonsei University,Jann Horn of Google Project Zero, an anonymous researcher, Russ Cox of Google, Jann Horn of Google Project Zero, Ret2 Systems Inc. worki",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://support.apple.com/zh-cn/HT208464",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2018-02629",
  "openTime": "2018-02-02",
  "patchDescription": "Apple iOS\u3001macOS High Sierra\u3001tvOS\u548cwatchOS\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Apple iOS\u662f\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u4e00\u5957\u64cd\u4f5c\u7cfb\u7edf\uff1bmacOS High Sierra\u662f\u4e00\u5957\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\uff1btvOS\u662f\u4e00\u5957\u667a\u80fd\u7535\u89c6\u64cd\u4f5c\u7cfb\u7edf\uff1bwatchOS\u662f\u4e00\u5957\u667a\u80fd\u624b\u8868\u64cd\u4f5c\u7cfb\u7edf\u3002Security\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4fe1\u606f\u5b89\u5168\u548c\u9690\u79c1\u4fdd\u62a4\u7684\u7ec4\u4ef6\u3002\r\n\r\n\u591a\u6b3eApple\u4ea7\u54c1\u4e2d\u7684Security\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4f7f\u8bbe\u5907\u65e0\u6cd5\u6b63\u786e\u7684\u5bf9\u8bc1\u4e66\u4f7f\u7528\u540d\u79f0\u9650\u5236\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eApple\u4ea7\u54c1Security\u7ec4\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2018-02629\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Apple tvOS \u003c11.2.5",
      "Apple macOS High Sierra \u003c10.13.3",
      "Apple IOS \u003c11.2.5",
      "Apple watchOS \u003c4.2.2"
    ]
  },
  "referenceLink": "https://support.apple.com/zh-cn/HT208464\r\nhttp://www.securityfocus.com/bid/102782",
  "serverity": "\u4e2d",
  "submitTime": "2018-01-25",
  "title": "\u591a\u6b3eApple\u4ea7\u54c1Security\u7ec4\u4ef6\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2018-02629\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…