CVE-2016-1827
The kernel in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1828, CVE-2016-1829, and CVE-2016-1830.
Published
2016-05-20T10:59:40.440
Last Modified
2025-04-12T10:46:40.837
Status
Deferred
Source
[email protected]
Severity
CVSSv3.0: 7.8 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
Mailing List, Vendor Advisory
([email protected])
-
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
Mailing List, Vendor Advisory
([email protected])
-
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
Mailing List, Vendor Advisory
([email protected])
-
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
Mailing List, Vendor Advisory
([email protected])
-
http://www.securityfocus.com/bid/90691
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id/1035890
Third Party Advisory, VDB Entry
([email protected])
-
https://support.apple.com/HT206564
Vendor Advisory
([email protected])
-
https://support.apple.com/HT206566
Vendor Advisory
([email protected])
-
https://support.apple.com/HT206567
Vendor Advisory
([email protected])
-
https://support.apple.com/HT206568
Vendor Advisory
([email protected])
-
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
Mailing List, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
Mailing List, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html
Mailing List, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html
Mailing List, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/90691
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id/1035890
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/HT206564
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/HT206566
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/HT206567
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://support.apple.com/HT206568
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)