漏洞信息详情
多款Apple产品ImageIO组件缓冲区错误漏洞
漏洞简介
Apple iOS等都是美国苹果(Apple)公司的产品。Apple iOS是一套为移动设备所开发的操作系统。Apple tvOS是一套智能电视操作系统。Apple iPadOS是一套用于iPad平板电脑的操作系统。
多款Apple产品中的ImageIO组件存在缓冲区错误漏洞。攻击者可借助恶意制作的图像利用该漏洞执行任意代码。以下产品及版本受到影响:Apple tvOS 13.3.1之前版本;iOS 13.3.1之前版本;iPadOS 13.3.1之前版本;watchOS 6.1.2之前版本;macOS Catalina 10.15.3之前版本。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://support.apple.com/zh-cn/HT210920
https://support.apple.com/zh-cn/HT210918
https://support.apple.com/zh-cn/HT210921
https://support.apple.com/zh-cn/HT210919
参考网址
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/May/53
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/May/54
来源:MISC
链接:https://support.apple.com/HT211168
来源:CONFIRM
链接:https://support.apple.com/kb/HT211171
来源:CONFIRM
链接:https://support.apple.com/kb/HT211170
来源:CONFIRM
链接:https://support.apple.com/kb/HT211175
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/May/59
来源:MISC
链接:https://support.apple.com/HT211181
来源:CONFIRM
链接:https://support.apple.com/kb/HT211179
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/May/55
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/May/56
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/May/57
来源:CONFIRM
链接:https://support.apple.com/kb/HT211178
来源:MISC
链接:https://support.apple.com/HT211175
来源:MISC
链接:https://support.apple.com/HT211178
来源:MISC
链接:https://support.apple.com/HT211171
来源:MISC
链接:https://support.apple.com/HT210920
来源:MISC
链接:https://support.apple.com/HT210921
来源:MISC
链接:https://support.apple.com/HT211179
来源:MISC
链接:https://support.apple.com/HT210918
来源:MISC
链接:https://support.apple.com/HT210919
来源:CONFIRM
链接:https://support.apple.com/kb/HT211181
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2020/May/49
来源:MISC
链接:https://support.apple.com/HT211170
来源:CONFIRM
链接:https://support.apple.com/kb/HT211168
来源:support.apple.com
链接:https://support.apple.com/en-au/HT210920
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Apple-macOS-multiple-vulnerabilities-31449
来源:support.apple.com
链接:https://support.apple.com/kb/HT211178
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1870/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-3878
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/49307
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Apple-macOS-multiple-vulnerabilities-32343
来源:support.apple.com
链接:https://support.apple.com/en-us/HT211179
来源:support.apple.com
链接:https://support.apple.com/en-us/HT211178
来源:support.apple.com
链接:https://support.apple.com/kb/HT211170
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/157883/Apple-Security-Advisory-2020-05-26-4.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0355/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/156260/macOS-iOS-ImageIO-PVR-Processing-Out-Of-Bounds-Read.html
受影响实体
暂无
补丁
- 多款Apple产品ImageIO组件缓冲区错误漏洞的修复措施<!--2020-1-31-->
还没有评论,来说两句吧...