cnvd-2021-00024
Vulnerability from cnvd
Title
Apple SQLite信息泄露漏洞
Description
Apple macOS是美国苹果(Apple)公司的一套专为Mac计算机所开发的专用操作系统。 Apple SQLite存在安全漏洞,允许远程攻击者可利用漏洞泄露内存。
Severity
Patch Name
Apple SQLite信息泄露漏洞的补丁
Patch Description
Apple macOS是美国苹果(Apple)公司的一套专为Mac计算机所开发的专用操作系统。 Apple SQLite存在安全漏洞,允许远程攻击者可利用漏洞泄露内存。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://support.apple.com/en-us/HT211931

Reference
https://support.apple.com/en-us/HT211931
Impacted products
Name
['Apple iOS < 14.0', 'Apple iPadOS < 14.0', 'Apple macOS Big Sur < 11.0.1', 'Apple watchOS < 7.0', 'Apple iTunes for Windows <12.10.9', 'Apple iCloud for Windows <11.5', 'Apple tvOS <14.0']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2020-9849",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-9849"
    }
  },
  "description": "Apple macOS\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\u3002\n\nApple SQLite\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u6cc4\u9732\u5185\u5b58\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://support.apple.com/en-us/HT211931",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2021-00024",
  "openTime": "2021-01-02",
  "patchDescription": "Apple macOS\u662f\u7f8e\u56fd\u82f9\u679c\uff08Apple\uff09\u516c\u53f8\u7684\u4e00\u5957\u4e13\u4e3aMac\u8ba1\u7b97\u673a\u6240\u5f00\u53d1\u7684\u4e13\u7528\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nApple SQLite\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u5141\u8bb8\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u6cc4\u9732\u5185\u5b58\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Apple SQLite\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Apple  iOS \u003c 14.0",
      "Apple iPadOS \u003c 14.0",
      "Apple  macOS Big Sur \u003c 11.0.1",
      "Apple watchOS \u003c 7.0",
      "Apple  iTunes for Windows \u003c12.10.9",
      "Apple  iCloud for Windows \u003c11.5",
      "Apple  tvOS \u003c14.0"
    ]
  },
  "referenceLink": "https://support.apple.com/en-us/HT211931",
  "serverity": "\u4e2d",
  "submitTime": "2020-12-16",
  "title": "Apple SQLite\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…