First published: Sun Jun 26 2016(Updated: )
Multiple buffer overflows in mDNSResponder before 625.41.2 allow remote attackers to read or write to out-of-bounds memory locations via vectors involving the (1) GetValueForIPv4Addr, (2) GetValueForMACAddr, (3) rfc3110_import, or (4) CopyNSEC3ResourceRecord function.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
iOS | >=9.0<9.1 | |
Apple iOS and macOS | >=10.9<10.9.5 | |
Apple iOS and macOS | >=10.10.0<10.10.5 | |
Apple iOS and macOS | >=10.11.0<10.11.1 | |
Apple iOS, iPadOS, and watchOS | <2.1 | |
Apple AirPort Base Station Firmware Update | >=7.6<7.6.7 | |
Apple AirPort Base Station Firmware Update | >=7.7<7.7.7 | |
Apple AirPort Extreme | ||
mDNSResponder | <625.41.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7987 is classified as a critical vulnerability due to its potential for remote code execution via buffer overflows.
To fix CVE-2015-7987, update the mDNSResponder to version 625.41.2 or later.
CVE-2015-7987 affects various Apple products, including iPhone OS, macOS Yosemite, and AirPort Base Station firmware.
Attack vectors for CVE-2015-7987 involve manipulating network traffic to exploit functions like GetValueForIPv4Addr and CopyNSEC3ResourceRecord.
Yes, CVE-2015-7987 can result in data breaches by allowing attackers to read or write to out-of-bounds memory locations.