First published: Sun Aug 16 2015(Updated: )
WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iTunes for Windows | <=12.2 | |
Apple Mobile Safari | >=6.0<6.2.8 | |
Apple Mobile Safari | >=7.0<7.1.8 | |
Apple Mobile Safari | >=8.0<8.0.8 | |
iStyle @cosme iPhone OS | <8.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3730 is classified as a high severity vulnerability that could allow remote code execution and denial of service.
To mitigate CVE-2015-3730, upgrade your Apple iOS, Safari, or iTunes to the latest versions released after the vulnerability was identified.
Users of Apple iOS versions before 8.4.1 and Safari versions before 6.2.8, 7.1.8, and 8.0.8 are affected by CVE-2015-3730.
CVE-2015-3730 can be exploited via crafted web pages that lead to memory corruption and possible arbitrary code execution.
Yes, CVE-2015-3730 can be exploited remotely by attackers through malicious websites.