CVE编号
CVE-2019-9197利用情况
暂无补丁情况
N/A披露时间
2020-01-01漏洞描述
The com.unity3d.kharma protocol handler in Unity Editor 2018.3 allows remote attackers to execute arbitrary code.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://unity3d.com/security#CVE-2019-9197 | |
https://www.zerodayinitiative.com/advisories/ZDI-19-252/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | unity3d | unity_editor | * |
From (including) 2017.4.22 |
Up to (excluding) 2017.4.22f1 |
||||
运行在以下环境 | |||||||||
应用 | unity3d | unity_editor | * |
From (including) 2018.2.21 |
Up to (excluding) 2018.2.21f1 |
||||
运行在以下环境 | |||||||||
应用 | unity3d | unity_editor | * |
From (including) 2018.3.7 |
Up to (excluding) 2018.3.7f1 |
||||
运行在以下环境 | |||||||||
应用 | unity3d | unity_editor | * |
From (including) 2019.1.0 |
Up to (excluding) 2019.1.0b5 |
||||
运行在以下环境 | |||||||||
应用 | unity3d | unity_editor | * |
From (including) 2019.2.0 |
Up to (excluding) 2019.2.0a7 |
||||
运行在以下环境 | |||||||||
应用 | unity3d | unity_editor | * |
From (including) 5.6.0 |
Up to (excluding) 5.6.7f1 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 需要
- 可用性 高
- 保密性 高
- 完整性 高
还没有评论,来说两句吧...