First published: Sun Jun 26 2016(Updated: )
The handle_regservice_request function in mDNSResponder before 625.41.2 allows remote attackers to execute arbitrary code or cause a denial of service (NULL pointer dereference) via unspecified vectors.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
iStyle @cosme iPhone OS | >=9.0<9.1 | |
Apple iOS and macOS | >=10.9<10.9.5 | |
Apple iOS and macOS | >=10.10.0<10.10.5 | |
Apple iOS and macOS | >=10.11.0<10.11.1 | |
Apple iOS, iPadOS, and watchOS | <2.1 | |
Apple AirPort Base Station Firmware Update | >=7.6<7.6.7 | |
Apple AirPort Base Station Firmware Update | >=7.7<7.7.7 | |
Apple AirPort Extreme | ||
mDNSResponder | <625.41.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7988 has been categorized as a critical vulnerability due to its potential to allow remote code execution and denial of service.
To fix CVE-2015-7988, users should upgrade to mDNSResponder version 625.41.2 or later, or apply relevant patches provided by Apple.
CVE-2015-7988 affects multiple Apple devices including certain iPhones, Macs running macOS Yosemite, and AirPort base stations using specific firmware versions.
Yes, CVE-2015-7988 can be exploited remotely, allowing attackers to execute arbitrary code or cause a denial of service.
CVE-2015-7988 specifically involves the handle_regservice_request function in mDNSResponder prior to version 625.41.2.