First published: Mon Feb 01 2016(Updated: )
WebKit, as used in Apple iOS before 9.2.1, Safari before 9.0.3, and tvOS before 9.1.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1727.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | <9.0.3 | |
iOS | <9.2.1 | |
tvOS | <9.1.1 | |
Apple iOS, iPadOS, and watchOS | <2.2 | |
WebKitGTK+ | <2.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1724 has a high severity rating due to its ability to allow remote code execution and potential denial of service.
To mitigate CVE-2016-1724, update affected systems to the latest versions of iOS, Safari, or tvOS as specified in the vendor's security announcements.
Users of Apple iOS versions before 9.2.1, Safari versions before 9.0.3, tvOS versions before 9.1.1, watchOS versions before 2.2, and WebKitGTK+ versions before 2.10.5 are affected by CVE-2016-1724.
CVE-2016-1724 can be exploited via crafted web content, allowing attackers to execute arbitrary code or cause memory corruption.
CVE-2016-1724 was disclosed in January 2016 as part of Apple's security updates.