CVE编号
CVE-2016-1835利用情况
暂无补丁情况
官方补丁披露时间
2016-05-20漏洞描述
Apple iOS是一款苹果手机上的操作系统。OS X El Capitan是为Mac计算机所开发的一套专用操作系统。Apple iOS和OS X El Capitan的libxml2中存在拒绝服务漏洞,攻击者可利用该漏洞使应用程序崩溃,造成拒绝服务攻击。
解决建议
用户可参考如下厂商提供的安全补丁以修复该漏洞:https://support.apple.com/en-au/HT206564
https://support.apple.com/en-au/HT206568
参考链接 |
|
---|---|
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html | |
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html | |
http://rhn.redhat.com/errata/RHSA-2016-2957.html | |
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html | |
http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | |
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html | |
http://www.securityfocus.com/bid/90696 | |
http://www.securitytracker.com/id/1035890 | |
http://www.ubuntu.com/usn/USN-2994-1 | |
http://xmlsoft.org/news.html | |
https://access.redhat.com/errata/RHSA-2016:1292 | |
https://bugzilla.gnome.org/show_bug.cgi?id=759020 | |
https://git.gnome.org/browse/libxml2/commit/?id=38eae571111db3b43ffdeb05487c9... | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10170 | |
https://support.apple.com/HT206567 | |
https://support.apple.com/HT206568 | |
https://www.debian.org/security/2016/dsa-3593 | |
https://www.tenable.com/security/tns-2016-18 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | apple | iphone_os | * |
Up to (including) 9.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | apple | mac_os_x | * |
Up to (including) 10.11.4 |
|||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 12.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 14.04 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 15.10 | - | |||||
运行在以下环境 | |||||||||
系统 | canonical | ubuntu_linux | 16.04 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | debian_linux | 8.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 2.9.3+dfsg1-1.1 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_7 | libxml2 | * |
Up to (excluding) 0:2.9.1-6.el7_2.3 |
|||||
运行在以下环境 | |||||||||
系统 | sles_12 | sles12-docker-image | * |
Up to (excluding) 1.1.4-20171002 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_12.04_lts | libxml2 | * |
Up to (excluding) 2.7.8.dfsg-5.1ubuntu4.15 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_14.04_lts | libxml2 | * |
Up to (excluding) 2.9.1+dfsg1-3ubuntu4.8 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | libxml2 | * |
Up to (excluding) 2.9.3+dfsg1-1ubuntu0.1 |
|||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...