cnvd-2020-22122
Vulnerability from cnvd
Title
多款Apple产品Icons组件沙盒限制漏洞
Description
Apple iOS等都是美国苹果(Apple)公司的产品。Apple iOS是一套为移动设备所开发的操作系统。Apple watchOS是一套智能手表操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。Icons是其中的一个图标组件。 Apple iOS 13.4之前版本、iPadOS 13.4之前版本和watchOS 6.2之前版本中的Icons组件存在安全漏洞。攻击者可利用该漏洞无需相应的权限便可获取图片。
Severity
Patch Name
多款Apple产品Icons组件沙盒限制漏洞的补丁
Patch Description
Apple iOS等都是美国苹果(Apple)公司的产品。Apple iOS是一套为移动设备所开发的操作系统。Apple watchOS是一套智能手表操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。Icons是其中的一个图标组件。 Apple iOS 13.4之前版本、iPadOS 13.4之前版本和watchOS 6.2之前版本中的Icons组件存在安全漏洞。攻击者可利用该漏洞无需相应的权限便可获取图片。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下供应商提供的安全公告获得补丁信息: https://support.apple.com/zh-cn/HT211103 https://support.apple.com/zh-cn/HT211102

Reference
https://nvd.nist.gov/vuln/detail/CVE-2020-3916
Impacted products
Name
['Apple iOS <13.4', 'Apple iPadOS <13.4', 'Apple watchOS <6.2']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2020-3916"
    }
  },
  "description": "Apple iOS\u7b49\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Apple iOS\u662f\u4e00\u5957\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Apple watchOS\u662f\u4e00\u5957\u667a\u80fd\u624b\u8868\u64cd\u4f5c\u7cfb\u7edf\u3002Apple iPadOS\u662f\u4e00\u5957\u7528\u4e8eiPad\u5e73\u677f\u7535\u8111\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Icons\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u56fe\u6807\u7ec4\u4ef6\u3002\n\nApple iOS 13.4\u4e4b\u524d\u7248\u672c\u3001iPadOS 13.4\u4e4b\u524d\u7248\u672c\u548cwatchOS 6.2\u4e4b\u524d\u7248\u672c\u4e2d\u7684Icons\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u65e0\u9700\u76f8\u5e94\u7684\u6743\u9650\u4fbf\u53ef\u83b7\u53d6\u56fe\u7247\u3002",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u4f9b\u5e94\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u516c\u544a\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttps://support.apple.com/zh-cn/HT211103\r\nhttps://support.apple.com/zh-cn/HT211102",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2020-22122",
  "openTime": "2020-04-09",
  "patchDescription": "Apple iOS\u7b49\u90fd\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002Apple iOS\u662f\u4e00\u5957\u4e3a\u79fb\u52a8\u8bbe\u5907\u6240\u5f00\u53d1\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Apple watchOS\u662f\u4e00\u5957\u667a\u80fd\u624b\u8868\u64cd\u4f5c\u7cfb\u7edf\u3002Apple iPadOS\u662f\u4e00\u5957\u7528\u4e8eiPad\u5e73\u677f\u7535\u8111\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002Icons\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u56fe\u6807\u7ec4\u4ef6\u3002\r\n\r\nApple iOS 13.4\u4e4b\u524d\u7248\u672c\u3001iPadOS 13.4\u4e4b\u524d\u7248\u672c\u548cwatchOS 6.2\u4e4b\u524d\u7248\u672c\u4e2d\u7684Icons\u7ec4\u4ef6\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u65e0\u9700\u76f8\u5e94\u7684\u6743\u9650\u4fbf\u53ef\u83b7\u53d6\u56fe\u7247\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "\u591a\u6b3eApple\u4ea7\u54c1Icons\u7ec4\u4ef6\u6c99\u76d2\u9650\u5236\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Apple  iOS \u003c13.4",
      "Apple  iPadOS \u003c13.4",
      "Apple  watchOS \u003c6.2"
    ]
  },
  "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2020-3916",
  "serverity": "\u4e2d",
  "submitTime": "2020-03-26",
  "title": "\u591a\u6b3eApple\u4ea7\u54c1Icons\u7ec4\u4ef6\u6c99\u76d2\u9650\u5236\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…