First published: Wed Mar 18 2015(Updated: )
WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <=6.2.3 | |
Apple Safari | =7.0 | |
Apple Safari | =7.0.1 | |
Apple Safari | =7.0.2 | |
Apple Safari | =7.0.3 | |
Apple Safari | =7.0.4 | |
Apple Safari | =7.0.5 | |
Apple Safari | =7.0.6 | |
Apple Safari | =7.1.0 | |
Apple Safari | =7.1.1 | |
Apple Safari | =7.1.2 | |
Apple Safari | =7.1.3 | |
Apple Safari | =8.0.0 | |
Apple Safari | =8.0.1 | |
Apple Safari | =8.0.2 | |
Apple Safari | =8.0.3 | |
tvOS | <=7.1 | |
Apple iPhone OS | <=8.2 | |
Apple iTunes | <=12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1071 is classified as a high severity vulnerability due to its potential for remote code execution and denial of service.
To fix CVE-2015-1071, you should update Apple Safari to the latest version available that is not affected by this vulnerability.
CVE-2015-1071 affects Apple Safari versions prior to 6.2.4, all 7.x versions before 7.1.4, and all 8.x versions before 8.0.4.
While CVE-2015-1071 primarily enables remote code execution and application crash, it may potentially lead to data loss depending on how the flaw is exploited.
There is no public information confirming that CVE-2015-1071 is being actively exploited, but vulnerabilities of this nature can be critical.