First published: Fri Oct 23 2015(Updated: )
Grand Central Dispatch in Apple iOS before 9.1, OS X before 10.11.1, and watchOS before 2.0.1 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted package that is mishandled during dispatch calls.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iOS | <=9.0.2 | |
Apple iOS and macOS | <=10.11.0 | |
Apple iOS, iPadOS, and watchOS | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-6989 is considered high due to the potential for arbitrary code execution and denial of service.
To fix CVE-2015-6989, users should upgrade their devices to iOS 9.1 or later, OS X 10.11.1 or later, or watchOS 2.0.1 or later.
CVE-2015-6989 affects iOS versions up to 9.0.2, OS X versions up to 10.11.0, and watchOS versions up to 2.0.0.
CVE-2015-6989 is a memory corruption vulnerability in Grand Central Dispatch that can lead to code execution or denial of service.
While specific exploitation of CVE-2015-6989 has not been widely reported, its high severity indicates it could be a target for attacks.