First published: Fri Apr 10 2015(Updated: )
The kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 does not properly determine whether an IPv6 packet had a local origin, which allows remote attackers to bypass an intended network-filtering protection mechanism via a crafted packet.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iOS | <=8.2 | |
Apple iOS and macOS | <=10.10.2 | |
tvOS | <=7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1104 is considered a medium severity vulnerability due to its potential for remote exploitation.
To mitigate the risk of CVE-2015-1104, users should update their devices to iOS 8.3, OS X 10.10.3, or tvOS 7.2 or later.
CVE-2015-1104 affects Apple iOS versions prior to 8.3, OS X versions prior to 10.10.3, and tvOS versions prior to 7.2.
CVE-2015-1104 allows remote attackers to bypass network-filtering mechanisms through crafted IPv6 packets.
There are no specific workarounds for CVE-2015-1104, and updating to the latest software is recommended for full protection.