ID CVE-2015-1070
Summary WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
References
Vulnerable Configurations
  • Apple iTunes 12.1
    cpe:2.3:a:apple:itunes:12.1
  • cpe:2.3:a:apple:safari:6.2.3
    cpe:2.3:a:apple:safari:6.2.3
  • Apple Safari 7.0
    cpe:2.3:a:apple:safari:7.0
  • Apple Safari 7.0.1
    cpe:2.3:a:apple:safari:7.0.1
  • Apple Safari 7.0.2
    cpe:2.3:a:apple:safari:7.0.2
  • Apple Safari 7.0.3
    cpe:2.3:a:apple:safari:7.0.3
  • Apple Safari 7.0.4
    cpe:2.3:a:apple:safari:7.0.4
  • Apple Safari 7.0.5
    cpe:2.3:a:apple:safari:7.0.5
  • cpe:2.3:a:apple:safari:7.0.6
    cpe:2.3:a:apple:safari:7.0.6
  • cpe:2.3:a:apple:safari:7.1.0
    cpe:2.3:a:apple:safari:7.1.0
  • cpe:2.3:a:apple:safari:7.1.1
    cpe:2.3:a:apple:safari:7.1.1
  • cpe:2.3:a:apple:safari:7.1.2
    cpe:2.3:a:apple:safari:7.1.2
  • cpe:2.3:a:apple:safari:7.1.3
    cpe:2.3:a:apple:safari:7.1.3
  • cpe:2.3:a:apple:safari:8.0.0
    cpe:2.3:a:apple:safari:8.0.0
  • cpe:2.3:a:apple:safari:8.0.1
    cpe:2.3:a:apple:safari:8.0.1
  • cpe:2.3:a:apple:safari:8.0.2
    cpe:2.3:a:apple:safari:8.0.2
  • cpe:2.3:a:apple:safari:8.0.3
    cpe:2.3:a:apple:safari:8.0.3
  • Apple iPhone OS 8.2
    cpe:2.3:o:apple:iphone_os:8.2
  • Apple tvOS 7.1
    cpe:2.3:o:apple:tvos:7.1
CVSS
Base: 6.8 (as of 28-07-2015 - 09:46)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SAFARI8_0_4.NASL
    description The version of Apple Safari installed on the remote Mac OS X host is prior to 6.2.4 / 7.1.4 / 8.0.4. It is, therefore, affected by multiple memory corruption vulnerabilities in WebKit due to improperly validated user-supplied input. A remote attacker, using a specially crafted website, can exploit these to execute arbitrary code. A flaw also exists related to user interface inconsistency that allows an attacker to conduct phishing attacks by spoofing the URL.
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 81915
    published 2015-03-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=81915
    title Mac OS X : Apple Safari < 6.2.4 / 7.1.4 / 8.0.4 Multiple Vulnerabilities
  • NASL family Misc.
    NASL id APPLETV_7_2.NASL
    description According to its banner, the remote Apple TV device is a version prior to 7.2. It is, therefore, affected by the following vulnerabilities : - Multiple memory corruption vulnerabilities exist in WebKit due to improperly validated user-supplied input. A remote attacker, using a specially crafted website, can exploit these to execute arbitrary code. (CVE-2015-1068, CVE-2015-1069, CVE-2015-1070, CVE-2015-1071, CVE-2015-1072, CVE-2015-1073, CVE-2015-1074, CVE-2015-1076, CVE-2015-1077, CVE-2015-1078, CVE-2015-1079, CVE-2015-1080, CVE-2015-1081, CVE-2015-1082, CVE-2015-1083, CVE-2015-1119, CVE-2015-1120, CVE-2015-1121, CVE-2015-1122, CVE-2015-1123, CVE-2015-1124) - An error exists in the IOKit objects due to improper validation of metadata used by an audio driver, which allows arbitrary code execution. (CVE-2015-1086) - An XML External Entity (XXE) injection vulnerability exists in the NSXMLParser due to improper handling of XML files, which allows information disclosure. (CVE-2015-1092) - An error exists in the IOAcceleratorFamily that allows the kernel memory layout to be disclosed. (CVE-2015-1094) - A memory corruption vulnerability exists in the IOHIDFamily API that allows arbitrary code execution. (CVE-2015-1095) - An error exists in the IOHIDFamily due to improper bounds checking, which allows the kernel memory layout to be disclosed. (CVE-2015-1096) - An error exists in the MobileFrameBuffer due to improper bounds checking, which allows the kernel memory layout to be disclosed. (CVE-2015-1097) - A denial of service vulnerability exists in the setreuid() system call due to a race condition. (CVE-2015-1099) - An out-of-bounds memory error exists in the kernel that allows a denial of service attack or information disclosure. (CVE-2015-1100) - A memory corruption vulnerability exists in the kernel that allows arbitrary code execution. (CVE-2015-1101) - A denial of service vulnerability exists due to a state inconsistency in the processing of TCP headers, which can only be exploited from an adjacent network. (CVE-2015-1102) - A vulnerability exists that allows a man-in-the-middle attacker to redirect traffic via ICMP redirects. (CVE-2015-1103) - A security bypass vulnerability exists due to the system treating remote IPv6 packets as local packets, which allows an attacker to bypass network filters. (CVE-2015-1104) - A denial of service vulnerability exists due to improper processing of TCP out-of-band data, which allows a denial of service by a remote attacker. (CVE-2015-1105) - An information disclosure vulnerability exists due to unique identifiers being sent to remote servers when downloading assets for a podcast. (CVE-2015-1110) - An information disclosure vulnerability exists in the third-party application sandbox that allows hardware identifiers to be accessible by other applications. (CVE-2015-1114) - A privilege escalation vulnerability exists in the setreuid() and setregid() system calls due to a failure to drop privileges permanently. (CVE-2015-1117) - A memory corruption vulnerability exists due to improper bounds checking when processing configuration profiles, which allows a denial of service attack. (CVE-2015-1118)
    last seen 2019-02-21
    modified 2018-12-14
    plugin id 82712
    published 2015-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=82712
    title Apple TV < 7.2 Multiple Vulnerabilities
  • NASL family Windows
    NASL id ITUNES_12_2_0.NASL
    description The version of Apple iTunes installed on the remote Windows host is prior to 12.2. It is, therefore, affected by multiple vulnerabilities in the bundled version of WebKit, including denial of service and arbitrary code execution vulnerabilities. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 84504
    published 2015-07-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=84504
    title Apple iTunes < 12.2 Multiple Vulnerabilities (credentialed check)
  • NASL family Peer-To-Peer File Sharing
    NASL id ITUNES_12_2_0_BANNER.NASL
    description The version of Apple iTunes running on the remote host is prior to 12.2. It is, therefore, affected by multiple vulnerabilities due to memory corruption issues in the WebKit component. An attacker can exploit these to cause a denial of service or execute arbitrary code. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 86600
    published 2015-10-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=86600
    title Apple iTunes < 12.2 Multiple Vulnerabilities (uncredentialed check)
refmap via4
apple
  • APPLE-SA-2015-03-17-1
  • APPLE-SA-2015-04-08-3
  • APPLE-SA-2015-04-08-4
  • APPLE-SA-2015-06-30-6
confirm
sectrack 1031936
Last major update 28-07-2015 - 11:18
Published 18-03-2015 - 18:59
Last modified 08-03-2019 - 11:06
Back to Top