First published: Fri Sep 18 2015(Updated: )
WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iOS | <=8.4.1 | |
Apple Mobile Safari | <=8.0.8 | |
Apple iTunes for Windows | <=12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5816 is categorized as a critical vulnerability due to its potential to allow remote code execution.
To mitigate CVE-2015-5816, update Apple iOS to version 9 or later, Safari to version 8.0.9 or later, and iTunes to version 12.3 or later.
CVE-2015-5816 affects Apple iPhone OS versions up to 8.4.1, Safari versions up to 8.0.8, and iTunes versions up to 12.2.
CVE-2015-5816 can be exploited through crafted web content that causes memory corruption, leading to arbitrary code execution or denial of service.
The impact of CVE-2015-5816 includes potential application crashes or unauthorized control over affected devices.