SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Multimedia)  >   Apple iTunes Vendors:   Apple
(Apple Issues Fix for Apple iTunes) Apple iOS Notification Processing Flaw Lets Remote Users Deny Service
SecurityTracker Alert ID:  1033589
SecurityTracker URL:  http://securitytracker.com/id/1033589
CVE Reference:   CVE-2015-1157   (Links to External Site)
Date:  Sep 16 2015
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 12.3
Description:   A vulnerability was reported in Apple iOS. A remote user can cause denial of service conditions on the target system. Apple iTunes is affected.

A remote user can send a specially crafted string of Unicode characters to trigger a flaw in the Springboard component and cause the target phone to crash and reboot.

This can be exploited via iMessage and other applications that are configured to display banner notifications.

This vulnerability is being actively exploited.

[Editor's note: The vendor's advisory "APPLE-SA-2015-06-30-1 iOS 8.4" indicates that arbitrary code execution is possible.]

Impact:   A remote user can cause the target device to crash and reboot.

A remote user may be able to execute arbitrary code.

Solution:   Apple has issued a fix for CVE-2015-1157 for Apple iTunes (12.3).

The Apple advisory is available at:

https://support.apple.com/en-us/HT205221

Vendor URL:  support.apple.com/en-us/HT205221 (Links to External Site)
Cause:   Access control error, State error
Underlying OS:  Windows (7), Windows (8), Windows (10)

Message History:   This archive entry is a follow-up to the message listed below.
May 27 2015 Apple iOS Notification Processing Flaw Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC