cnvd-2017-05101
Vulnerability from cnvd

Title: Apple iOS/tvOS/macOS/watchOS任意代码执行漏洞(CNVD-2017-05101)

Description:

Apple macOS是美国苹果(Apple)公司为Mac计算机所开发的一套专用操作系统。tvOS是专门为第四代Apple TV设计的操作系统。Mac OS是一套运行于苹果Macintosh系列电脑上的操作系统。watchOS是由苹果公司开发的Apple Watch的移动操作系统。

苹果多款产品的‘Kernel’组件存在任意代码执行漏洞。攻击者可借助特制的应用程序利用该漏洞执行任意代码。

Severity:

Patch Name: Apple iOS/tvOS/macOS/watchOS任意代码执行漏洞(CNVD-2017-05101)的补丁

Patch Description:

Apple macOS是美国苹果(Apple)公司为Mac计算机所开发的一套专用操作系统。tvOS是专门为第四代Apple TV设计的操作系统。Mac OS是一套运行于苹果Macintosh系列电脑上的操作系统。watchOS是由苹果公司开发的Apple Watch的移动操作系统。

苹果多款产品的‘Kernel’组件存在任意代码执行漏洞。攻击者可借助特制的应用程序利用该漏洞执行任意代码。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

厂商已发布漏洞修复程序,请及时关注更新: https://support.apple.com/zh-cn/HT207601 https://support.apple.com/zh-cn/HT207602 https://support.apple.com/zh-cn/HT207615 https://support.apple.com/zh-cn/HT207617

Reference: https://www.exploit-db.com/exploits/41778/ https://support.apple.com/zh-cn/HT207601 https://support.apple.com/zh-cn/HT207602 https://support.apple.com/zh-cn/HT207615 https://support.apple.com/zh-cn/HT207617 http://www.securityfocus.com/bid/97137

Impacted products
Name
['Apple tvOS <10.2', 'Apple iOS <10.3', 'Apple MacOS <10.12.4', 'Apple watchOS <3.2']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "97137"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-2456"
    }
  },
  "description": "Apple macOS\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e00\u5957\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\u3002tvOS\u662f\u4e13\u95e8\u4e3a\u7b2c\u56db\u4ee3Apple TV\u8bbe\u8ba1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Mac OS\u662f\u4e00\u5957\u8fd0\u884c\u4e8e\u82f9\u679cMacintosh\u7cfb\u5217\u7535\u8111\u4e0a\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002watchOS\u662f\u7531\u82f9\u679c\u516c\u53f8\u5f00\u53d1\u7684Apple Watch\u7684\u79fb\u52a8\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u82f9\u679c\u591a\u6b3e\u4ea7\u54c1\u7684\u2018Kernel\u2019\u7ec4\u4ef6\u5b58\u5728\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
  "discovererName": "John Villamil, Doyensec, riusksk of Tencent Security Platform Department, Omer Medan of enSilo Ltd, Lufeng Li of Qihoo 360 Vulcan Team, Qidan He of KeenLab Tencent, an anonymous researcher working with Trend Micro\u00e2??s Zero Day Initiative, John Villamil of",
  "formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.apple.com/zh-cn/HT207601\r\nhttps://support.apple.com/zh-cn/HT207602\r\nhttps://support.apple.com/zh-cn/HT207615\r\nhttps://support.apple.com/zh-cn/HT207617",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-05101",
  "openTime": "2017-04-22",
  "patchDescription": "Apple macOS\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e00\u5957\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\u3002tvOS\u662f\u4e13\u95e8\u4e3a\u7b2c\u56db\u4ee3Apple TV\u8bbe\u8ba1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Mac OS\u662f\u4e00\u5957\u8fd0\u884c\u4e8e\u82f9\u679cMacintosh\u7cfb\u5217\u7535\u8111\u4e0a\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002watchOS\u662f\u7531\u82f9\u679c\u516c\u53f8\u5f00\u53d1\u7684Apple Watch\u7684\u79fb\u52a8\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\n\u82f9\u679c\u591a\u6b3e\u4ea7\u54c1\u7684\u2018Kernel\u2019\u7ec4\u4ef6\u5b58\u5728\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u501f\u52a9\u7279\u5236\u7684\u5e94\u7528\u7a0b\u5e8f\u5229\u7528\u8be5\u6f0f\u6d1e\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Apple iOS/tvOS/macOS/watchOS\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2017-05101\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Apple tvOS \u003c10.2",
      "Apple  iOS \u003c10.3",
      "Apple MacOS \u003c10.12.4",
      "Apple watchOS \u003c3.2"
    ]
  },
  "referenceLink": "https://www.exploit-db.com/exploits/41778/\r\nhttps://support.apple.com/zh-cn/HT207601\r\nhttps://support.apple.com/zh-cn/HT207602\r\nhttps://support.apple.com/zh-cn/HT207615\r\nhttps://support.apple.com/zh-cn/HT207617\r\nhttp://www.securityfocus.com/bid/97137",
  "serverity": "\u9ad8",
  "submitTime": "2017-04-01",
  "title": "Apple iOS/tvOS/macOS/watchOS\u4efb\u610f\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\uff08CNVD-2017-05101\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…