ID

VAR-201503-0096


CVE

CVE-2015-1072


TITLE

Apple Safari Used in etc. Webkit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2015-001871

DESCRIPTION

WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1. Apple Safari Used in etc. Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. A security vulnerability exists in WebKit used in Apple Safari. The following versions are affected: Apple Safari prior to 6.2.4, 7.x prior to 7.1.4, and 8.x prior to 8.0.4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2015-04-08-3 iOS 8.3 iOS 8.3 is now available and addresses the following: AppleKeyStore Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to guess the user's passcode Description: iOS allowed access to an interface which allowed attempts to confirm the user's passcode. This issue was addressed with improved entitlement checking. CVE-ID CVE-2015-1085 Audio Drivers Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A validation issue existed in IOKit objects used by an audio driver. This issue was addressed through improved validation of metadata. CVE-ID CVE-2015-1086 Backup Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker may be able to use the backup system to access restricted areas of the file system Description: An issue existed in the relative path evaluation logic of the backup system. This issues was addressed through improved path evaluation. CVE-ID CVE-2015-1087 : TaiG Jailbreak Team Certificate Trust Policy Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Update to the certificate trust policy Description: The certificate trust policy was updated. The complete list of certificates may be viewed at https://support.apple.com/en- us/HT204132 CFNetwork Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Cookies belonging to one origin may be sent to another origin Description: A cross-domain cookie issue existed in redirect handling. Cookies set in a redirect response could be passed on to a redirect target belonging to another origin. The issue was address through improved handling of redirects. CVE-ID CVE-2015-1089 : Niklas Keller CFNetwork Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A user may be unable to fully delete browsing history Description: Clearing Safari's history did not clear saved HTTP Strict Transport Security state. The issue was addressed through improved data deletion. CVE-ID CVE-2015-1090 CFNetwork Session Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Authentication credentials may be sent to a server on another origin Description: A cross-domain HTTP request headers issue existed in redirect handling. HTTP request headers sent in a redirect response could be passed on to another origin. The issue was addressed through improved handling of redirects. CVE-ID CVE-2015-1091 : Diego Torres (http://dtorres.me) CFURL Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: An input validation issue existed within URL processing. This issue was addressed through improved URL validation. CVE-ID CVE-2015-1088 Foundation Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An application using NSXMLParser may be misused to disclose information Description: An XML External Entity issue existed in NSXMLParser's handling of XML. This issue was addressed by not loading external entities across origins. CVE-ID CVE-2015-1092 : Ikuya Fukumoto FontParser Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted font file may lead to arbitrary code execution Description: Multiple memory corruption issues existed in the processing of font files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-1093 : Marc Schoenefeld IOAcceleratorFamily Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in IOAcceleratorFamily that led to the disclosure of kernel memory content. This issue was addressed by removing unneeded code. CVE-ID CVE-2015-1094 : Cererdlong of Alibaba Mobile Security Team IOHIDFamily Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious HID device may be able to cause arbitrary code execution Description: A memory corruption issue existed in an IOHIDFamily API. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1095 : Andrew Church IOHIDFamily Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in IOHIDFamily that led to the disclosure of kernel memory content. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-1096 : Ilja van Sprundel of IOActive IOMobileFramebuffer Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to determine kernel memory layout Description: An issue existed in MobileFrameBuffer that led to the disclosure of kernel memory content. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-1097 : Barak Gabai of the IBM X-Force Application Security Research Team iWork Viewer Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Opening a maliciously crafted iWork file may lead to arbitrary code execution Description: A memory corruption issue existed in the handling of iWork files. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1098 : Christopher Hickstein Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to cause a system denial of service Description: A race condition existed in the kernel's setreuid system call. This issue was addressed through improved state management. CVE-ID CVE-2015-1099 : Mark Mentovai of Google Inc. Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may escalate privileges using a compromised service intended to run with reduced privileges Description: setreuid and setregid system calls failed to drop privileges permanently. This issue was addressed by correctly dropping privileges. CVE-ID CVE-2015-1117 : Mark Mentovai of Google Inc. Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to cause unexpected system termination or read kernel memory Description: A out of bounds memory access issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1100 : Maxime Villard of m00nbsd Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to execute arbitrary code with system privileges Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. CVE-ID CVE-2015-1101 : lokihardt@ASRT working with HP's Zero Day Initiative Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker with a privileged network position may be able to cause a denial of service Description: A state inconsistency existed in the processing of TCP headers. This issue was addressed through improved state handling. CVE-ID CVE-2015-1102 : Andrey Khudyakov and Maxim Zhuravlev of Kaspersky Lab Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker with a privileged network position may be able to redirect user traffic to arbitrary hosts Description: ICMP redirects were enabled by default on iOS. This issue was addressed by disabling ICMP redirects. CVE-ID CVE-2015-1103 : Zimperium Mobile Security Labs Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A remote attacker may be able to bypass network filters Description: The system would treat some IPv6 packets from remote network interfaces as local packets. The issue was addressed by rejecting these packets. CVE-ID CVE-2015-1104 : Stephen Roettger of the Google Security Team Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A remote attacker may be able to cause a denial of service Description: A state inconsistency issue existed in the handling of TCP out of band data. This issue was addressed through improved state management. CVE-ID CVE-2015-1105 : Kenton Varda of Sandstorm.io Keyboards Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: QuickType could learn users' passcodes Description: When using Bluetooth keyboards, QuickType could learn users' passcodes. This issue was addressed by preventing QuickType from being displayed on the lockscreen. CVE-ID CVE-2015-1106 : Jarrod Dwenger, Steve Favorito, Paul Reedy of ConocoPhillips, Pedro Tavares of Molecular Biophysics at UCIBIO/FCT/UNL, De Paul Sunny, Christian Still of Evolve Media, Canada libnetcore Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted configuration profile may lead to unexpected application termination Description: A memory corruption issue existed in the handling of configuration profiles. This issue was addressed through improved bounds checking. CVE-ID CVE-2015-1118 : Zhaofeng Chen, Hui Xue, Yulong Zhang, and Tao Wei of FireEye, Inc. Lock Screen Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker in possession of a device may prevent erasing the device after failed passcode attempts Description: In some circumstances, a device might not erase itself after failed passcode attempts. This issue was addressed through additional enforcement of erasure. CVE-ID CVE-2015-1107 : Brent Erickson, Stuart Ryan of University of Technology, Sydney Lock Screen Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker in possession of a device may exceed the maximum number of failed passcode attempts Description: In some circumstances, the failed passcode attempt limit was not enforced. This issue was addressed through additional enforcement of this limit. CVE-ID CVE-2015-1108 NetworkExtension Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker in possession of a device may be able to recover VPN credentials Description: An issue existed in the handling of VPN configuration logs. This issue was addressed by removing logging of credentials. CVE-ID CVE-2015-1109 : Josh Tway of IPVanish Podcasts Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Unnecessary information may be sent to external servers when downloading podcast assets Description: When downloading assets for podcast a user was subscribed to, unique identifiers were sent to external servers. This issue was resolved by removing these identifiers. CVE-ID CVE-2015-1110 : Alex Selivanov Safari Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A user may be unable to fully delete browsing history Description: Clearing Safari's history did not clear "Recently closed tabs". The issue was addressed through improved data deletion. CVE-ID CVE-2015-1111 : Frode Moe of LastFriday.no Safari Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Users' browsing history may not be completely purged Description: A state management issue existed in Safari that resulted in users' browsing history not being purged from history.plist. This issue was addressed by improved state management. CVE-ID CVE-2015-1112 : William Breuer, The Netherlands Sandbox Profiles Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to access phone numbers or email addresses of recent contacts Description: An information disclosure issue existed in the third- party app sandbox. This issue was addressed by improving the sandbox profile. CVE-ID CVE-2015-1113 : Andreas Kurtz of NESO Security Labs, Markus TroBbach of Heilbronn University Sandbox Profiles Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Hardware identifiers may be accessible by third-party apps Description: An information disclosure issue existed in the third- party app sandbox. This issue was addressed by improving the sandbox profile. CVE-ID CVE-2015-1114 Telephony Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to access restricted telephony functions Description: An access control issue existed in the telephony subsystem. Sandboxed apps could access restricted telephony functions. This issue was addressed with improved entitlement checking. CVE-ID CVE-2015-1115 : Andreas Kurtz of NESO Security Labs, Markus TroBbach of Heilbronn University UIKit View Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Sensitive data may be exposed in application snapshots presented in the Task Switcher Description: An issue existed in UIKit, which did not blur application snapshots containing sensitive data in the Task Switcher. This issue was addressed by correctly blurring the snapshot. CVE-ID CVE-2015-1116 : The mobile app team at HP Security Voltage, Aaron Rogers of Mint.com, David Edwards of Tech4Tomorrow, David Zhang of Dropbox WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Inconsistent user interface may prevent users from discerning a phishing attack Description: A user interface inconsistency existed in Safari that allowed an attacker to misrepresent the URL. This issue was addressed through improved user interface consistency checks. CVE-ID CVE-2015-1084 : Apple WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-2015-1124 : Apple WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to a user invoking a click on another website Description: An issue existed when handling touch events. A tap could propagate to another website. The issue was addressed through improved event handling. CVE-ID CVE-2015-1125 : Phillip Moon and Matt Weston of www.sandfield.co.nz WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to resources of another origin being accessed Description: An issue existed in WebKit when handling credentials in FTP URLs. This issue was address through improved decoding. CVE-ID CVE-2015-1126 : Jouko Pynnonen of Klikki Oy Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "8.3". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJVJKl9AAoJEBcWfLTuOo7tJSQQAISlSqHZbMZOKrc6qCQ3E+Yn ROyg7duvjIiaOHEiromwOpXjINbRTlhV5I6cseJrZOa7oLhgtIFes7wCo2rj/IjK pTv3GMc84r7gPY38JE6//rU6Ni9YCuSKt69iOpF2RmKCLrrhjyP/igY/IKro3ujS YyDgEEtmBtekU/QbUcZb8qfQ+/E0O6ZwZqvmzlmbcmeqM0/xy/lb8MmPcPwSTCTc oQUj3xF+2OBIyudzQX6PmTFIDQjKYUg2dXEapYhzUhVkaZkdhRsJDaNJR7rlOYhK Zea99fN+wnRr6F6IklXRTUdf4Lwegjs+kBA0HqrsxTX/LORQu98LWWXJ5vcl7OvE moZRu46Jw7+AEwC2V3t7Bl6HbeHf3/jtQTV8q7ALdRhOcwgJdQUubRyMl1ZIG0NE N3M6lxSxlkn5CuPggQcONc1SwkCfplIntxJ8ECDTW/mVc/GrmSN5BH19Lzd3gWFR vRD5soYzZrTfWaULp+VzepiWz0FpJsJPn/sDQxvZfOzSzIsFKCX3OO671lXC7fV+ Qgl5vPXleUGxgScn0jQEDPrXAj6U85xqfXc+aZn8jKpfMthfukKXM8Tazlz2Ywyj g2EaerJBFCavTPpQpuq0MOL6RYo2PhlC6tkwT25NaG01v/wEfzs75Dgc2Z15QtaH ceXrdFVQDQ9LSl38/qPo =ifj1 -----END PGP SIGNATURE-----

Trust: 2.16

sources: NVD: CVE-2015-1072 // JVNDB: JVNDB-2015-001871 // VULHUB: VHN-79032 // VULMON: CVE-2015-1072 // PACKETSTORM: 132529 // PACKETSTORM: 131360 // PACKETSTORM: 131361 // PACKETSTORM: 130894

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:7.1.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.1.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.6

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 1.6

vendor:applemodel:safariscope:eqversion:8.0.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.1.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.1.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:8.0.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 1.6

vendor:applemodel:safariscope:eqversion:8.0.0

Trust: 1.6

vendor:applemodel:tvosscope:lteversion:7.1

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:8.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 1.0

vendor:applemodel:itunesscope:lteversion:12.1

Trust: 1.0

vendor:applemodel:safariscope:lteversion:6.2.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:8.0.2

Trust: 1.0

vendor:applemodel:tvscope:ltversion:7.2 (apple tv first 3 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.3 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.3 (iphone 4s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:8.3 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:12.2 (windows 7)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:12.2 (windows 8)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.2.4

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.1.4

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.0.4

Trust: 0.8

sources: JVNDB: JVNDB-2015-001871 // CNNVD: CNNVD-201503-373 // NVD: CVE-2015-1072

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-1072
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-1072
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201503-373
value: MEDIUM

Trust: 0.6

VULHUB: VHN-79032
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-1072
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-1072
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-79032
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-79032 // VULMON: CVE-2015-1072 // JVNDB: JVNDB-2015-001871 // CNNVD: CNNVD-201503-373 // NVD: CVE-2015-1072

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-79032 // JVNDB: JVNDB-2015-001871 // NVD: CVE-2015-1072

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201503-373

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201503-373

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001871

PATCH

title:APPLE-SA-2015-03-17-1 Safari 8.0.4, Safari 7.1.4, and Safari 6.2.4url:http://lists.apple.com/archives/security-announce/2015/Mar/msg00004.html

Trust: 0.8

title:APPLE-SA-2015-06-30-6 iTunes 12.2url:http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html

Trust: 0.8

title:APPLE-SA-2015-04-08-3 iOS 8.3url:http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html

Trust: 0.8

title:APPLE-SA-2015-04-08-4 Apple TV 7.2url:http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html

Trust: 0.8

title:HT204662url:https://support.apple.com/en-us/HT204662

Trust: 0.8

title:HT204560url:http://support.apple.com/en-us/HT204560

Trust: 0.8

title:HT204949url:http://support.apple.com/en-us/HT204949

Trust: 0.8

title:HT204661url:https://support.apple.com/en-us/HT204661

Trust: 0.8

title:HT204661url:https://support.apple.com/ja-jp/HT204661

Trust: 0.8

title:HT204662url:https://support.apple.com/ja-jp/HT204662

Trust: 0.8

title:HT204560url:http://support.apple.com/ja-jp/HT204560

Trust: 0.8

title:HT204949url:http://support.apple.com/ja-jp/HT204949

Trust: 0.8

title:Safari6.2.4MountainLionurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54503

Trust: 0.6

title:Safari8.0.4Yosemiteurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54505

Trust: 0.6

title:Safari7.1.4Mavericksurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=54504

Trust: 0.6

title:Apple: Safari 8.0.4, Safari 7.1.4, and Safari 6.2.4url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=38465d201e29aafea9776e5b8b706192

Trust: 0.1

title:Apple: iTunes 12.2url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=2226f3b33d2757eb165213f6cbf380a9

Trust: 0.1

sources: VULMON: CVE-2015-1072 // JVNDB: JVNDB-2015-001871 // CNNVD: CNNVD-201503-373

EXTERNAL IDS

db:NVDid:CVE-2015-1072

Trust: 3.0

db:SECTRACKid:1031936

Trust: 1.8

db:JVNid:JVNVU91828320

Trust: 0.8

db:JVNid:JVNVU99221748

Trust: 0.8

db:JVNDBid:JVNDB-2015-001871

Trust: 0.8

db:CNNVDid:CNNVD-201503-373

Trust: 0.7

db:VULHUBid:VHN-79032

Trust: 0.1

db:VULMONid:CVE-2015-1072

Trust: 0.1

db:PACKETSTORMid:132529

Trust: 0.1

db:PACKETSTORMid:131360

Trust: 0.1

db:PACKETSTORMid:131361

Trust: 0.1

db:PACKETSTORMid:130894

Trust: 0.1

sources: VULHUB: VHN-79032 // VULMON: CVE-2015-1072 // JVNDB: JVNDB-2015-001871 // PACKETSTORM: 132529 // PACKETSTORM: 131360 // PACKETSTORM: 131361 // PACKETSTORM: 130894 // CNNVD: CNNVD-201503-373 // NVD: CVE-2015-1072

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/mar/msg00004.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2015/apr/msg00002.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2015/apr/msg00003.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00006.html

Trust: 1.8

url:https://support.apple.com/ht204560

Trust: 1.8

url:https://support.apple.com/ht204661

Trust: 1.8

url:https://support.apple.com/ht204662

Trust: 1.8

url:https://support.apple.com/kb/ht204949

Trust: 1.8

url:http://www.securitytracker.com/id/1031936

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1072

Trust: 0.8

url:http://jvn.jp/vu/jvnvu99221748/index.html

Trust: 0.8

url:http://jvn.jp/vu/jvnvu91828320/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1071

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2015-1073

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1069

Trust: 0.4

url:http://support.apple.com/kb/ht1222

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1079

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1076

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1077

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1074

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1070

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1071

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1072

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1080

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1068

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2015-1078

Trust: 0.4

url:https://www.apple.com/support/security/pgp/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1083

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1081

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1082

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1075

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1092

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1086

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1095

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1084

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1094

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1096

Trust: 0.2

url:http://gpgtools.org

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://support.apple.com/kb/ht204560

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=37909

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4479

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4452

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4471

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4473

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4468

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4475

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4476

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4474

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-3192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4459

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4469

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4472

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4477

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4470

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-4466

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1093

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1090

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1089

Trust: 0.1

url:https://support.apple.com/en-

Trust: 0.1

url:https://www.sandfield.co.nz

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1087

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1088

Trust: 0.1

url:http://dtorres.me)

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1091

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1099

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1101

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1102

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1105

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1104

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1103

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1097

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1100

Trust: 0.1

sources: VULHUB: VHN-79032 // VULMON: CVE-2015-1072 // JVNDB: JVNDB-2015-001871 // PACKETSTORM: 132529 // PACKETSTORM: 131360 // PACKETSTORM: 131361 // PACKETSTORM: 130894 // CNNVD: CNNVD-201503-373 // NVD: CVE-2015-1072

CREDITS

Apple

Trust: 0.4

sources: PACKETSTORM: 132529 // PACKETSTORM: 131360 // PACKETSTORM: 131361 // PACKETSTORM: 130894

SOURCES

db:VULHUBid:VHN-79032
db:VULMONid:CVE-2015-1072
db:JVNDBid:JVNDB-2015-001871
db:PACKETSTORMid:132529
db:PACKETSTORMid:131360
db:PACKETSTORMid:131361
db:PACKETSTORMid:130894
db:CNNVDid:CNNVD-201503-373
db:NVDid:CVE-2015-1072

LAST UPDATE DATE

2024-11-23T20:00:03.864000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-79032date:2019-03-08T00:00:00
db:VULMONid:CVE-2015-1072date:2019-03-08T00:00:00
db:JVNDBid:JVNDB-2015-001871date:2015-07-07T00:00:00
db:CNNVDid:CNNVD-201503-373date:2019-03-13T00:00:00
db:NVDid:CVE-2015-1072date:2024-11-21T02:24:36.307

SOURCES RELEASE DATE

db:VULHUBid:VHN-79032date:2015-03-18T00:00:00
db:VULMONid:CVE-2015-1072date:2015-03-18T00:00:00
db:JVNDBid:JVNDB-2015-001871date:2015-03-20T00:00:00
db:PACKETSTORMid:132529date:2015-07-02T11:08:22
db:PACKETSTORMid:131360date:2015-04-09T16:33:18
db:PACKETSTORMid:131361date:2015-04-09T16:39:51
db:PACKETSTORMid:130894date:2015-03-19T05:01:53
db:CNNVDid:CNNVD-201503-373date:2015-03-19T00:00:00
db:NVDid:CVE-2015-1072date:2015-03-18T22:59:04.313