First published: Fri Sep 18 2015(Updated: )
XNU in the kernel in Apple iOS before 9 does not properly validate the headers of TCP packets, which allows remote attackers to bypass the sequence-number protection mechanism and cause a denial of service (TCP connection disruption) via a crafted header.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=8.4.1 | |
Apple iOS and macOS | <=10.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5879 has a moderate severity rating due to its potential to cause denial of service.
To fix CVE-2015-5879, update to a secure version of iOS 9 or later, or macOS 10.11 or later.
CVE-2015-5879 affects Apple iOS versions below 9 and macOS Yosemite versions below 10.11.
CVE-2015-5879 exploits improper validation of TCP packet headers, allowing sequence-number protection bypass.
CVE-2015-5879 can lead to disrupted TCP connections, causing user-facing denial of service.