ID CVE-2015-1149
Summary Integer overflow in the simulator in Swift in Apple Xcode before 6.3 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact by triggering an incorrect result of a type conversion.
References
Vulnerable Configurations
  • cpe:2.3:a:apple:xcode:-:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:1.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:1.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:2.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:2.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:2.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:2.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:2.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:2.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:2.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:2.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.1.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:3.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:3.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.5:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.6:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:4.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:4.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:5.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:5.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:5.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:5.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:5.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:5.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:5.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:6.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:6.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:6.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:6.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:xcode:6.2:beta_2:*:*:*:*:*:*
    cpe:2.3:a:apple:xcode:6.2:beta_2:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-09-2015 - 17:58)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
apple APPLE-SA-2015-04-08-5
confirm https://support.apple.com/HT204663
sectrack 1032049
Last major update 11-09-2015 - 17:58
Published 10-04-2015 - 14:59
Last modified 11-09-2015 - 17:58
Back to Top