First published: Fri Dec 11 2015(Updated: )
Apple iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted SSL handshake.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | <=9.1 | |
Apple iOS, iPadOS, and watchOS | <=2.0 | |
Apple iOS and macOS | <=10.11.1 | |
tvOS | <=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7073 has a high severity rating due to its potential to allow remote code execution and denial of service.
To fix CVE-2015-7073, users should update their devices to iOS 9.2, OS X 10.11.2, tvOS 9.1, or watchOS 2.1 or later.
CVE-2015-7073 affects Apple devices running iOS before 9.2, OS X before 10.11.2, tvOS before 9.1, and watchOS before 2.1.
CVE-2015-7073 allows attackers to execute arbitrary code or cause a denial of service through memory corruption.
If your device is updated to the latest versions that address CVE-2015-7073, it is no longer vulnerable to this specific threat.