First published: Fri Sep 18 2015(Updated: )
dyld in Apple iOS before 9 allows attackers to bypass a code-signing protection mechanism via an app that places a crafted signature in an executable file.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS, iPadOS, and watchOS | =1.0 | |
Apple iOS and macOS | <=10.10.5 | |
iPhone OS | <=8.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5839 has a high severity rating due to its potential to allow code-signing bypass, leading to execution of malicious code.
To fix CVE-2015-5839, update your affected Apple iOS or macOS software to the latest versions that mitigate this vulnerability.
CVE-2015-5839 affects Apple iOS versions prior to 9, macOS Yosemite up to 10.10.5, and watchOS 1.0.
Exploiting CVE-2015-5839 could allow attackers to execute arbitrary code without proper code-signing validation.
There are no effective workarounds for CVE-2015-5839; updating to the latest software version is recommended.