First published: Mon Feb 01 2016(Updated: )
WebKit, as used in Apple iOS before 9.2.1, Safari before 9.0.3, and tvOS before 9.1.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1724.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | <9.0.3 | |
iStyle @cosme iPhone OS | <9.2.1 | |
tvOS | <9.1.1 | |
Apple iOS, iPadOS, and watchOS | <2.2 | |
WebKitGTK+ | <2.10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1727 has a high severity rating due to the potential for remote code execution and denial of service.
To fix CVE-2016-1727, users should update their affected Apple devices and software to the latest versions available.
CVE-2016-1727 affects Apple iOS before 9.2.1, Safari before 9.0.3, tvOS before 9.1.1, and other specific versions of WebKit and watchOS.
Exploiting CVE-2016-1727 can allow attackers to execute arbitrary code or cause memory corruption leading to a denial of service.
Users of Apple devices including iPhones, iPads, and Macs running the specified versions of iOS, Safari, tvOS, and WebKitGTK+ are vulnerable to CVE-2016-1727.