漏洞信息详情
多款 Apple 产品缓冲区错误漏洞
漏洞简介
Apple Safari等都是美国苹果(Apple)公司的产品。Apple Safari是一款Web浏览器,是Mac OS X和iOS操作系统附带的默认浏览器。Apple iOS是一套为移动设备所开发的操作系统。Apple tvOS是一套智能电视操作系统。
多款 Apple 产品存在缓冲区错误漏洞,该漏洞源于在WebKit中处理HTML内容时出现边界错误。远程攻击者可利用该漏洞可以创建一个专门制作的网页,诱骗受害者打开它,引发内存损坏,并在目标系统上执行任意代码。该漏洞允许远程攻击者可利用该漏洞在目标系统上执行任意代码。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://support.apple.com/zh-cn/HT201222
参考网址
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/10/26/9
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2021/Oct/63
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2021/Oct/62
来源:MISC
链接:https://support.apple.com/en-us/HT212816
来源:MISC
链接:https://support.apple.com/en-us/HT212814
来源:CONFIRM
链接:https://support.apple.com/kb/HT212869
来源:MISC
链接:https://support.apple.com/en-us/HT212815
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ON5SDVVPVPCAGFPW2GHYATZVZYLPW2L4/
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/10/27/1
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/10/27/2
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/10/27/4
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4995
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4996
来源:MISC
链接:https://support.apple.com/en-us/HT212807
来源:MISC
链接:https://support.apple.com/en-us/HT212819
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2021/Oct/61
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/H6MGXCX7P5AHWOQ6IRT477UKT7IS4DAD/
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2021/Oct/60
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021110113
来源:support.apple.com
链接:https://support.apple.com/en-us/HT212815
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164242/Apple-Security-Advisory-2021-09-20-6.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3159.2
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2021-30846
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021092024
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-30846
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/WebKitGTK-WPE-WebKit-multiple-vulnerabilities-36750
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164516/WebKit-PointerCaptureController-processPendingPointerCapture-Heap-Use-After-Free.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3996
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3578
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3631
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164736/Ubuntu-Security-Notice-USN-5127-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3641
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164692/Apple-Security-Advisory-2021-10-26-10.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Apple-iOS-macOS-multiple-vulnerabilities-36461
受影响实体
暂无
补丁
- 多款 Apple 产品缓冲区错误漏洞的修复措施<!--2021-9-20-->
还没有评论,来说两句吧...