Vulnerability Name: | CVE-2015-3738 (CCN-105619) | ||||||||||||||||||||||||
Assigned: | 2015-08-11 | ||||||||||||||||||||||||
Published: | 2015-08-11 | ||||||||||||||||||||||||
Updated: | 2019-02-08 | ||||||||||||||||||||||||
Summary: | WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3. | ||||||||||||||||||||||||
CVSS v3 Severity: | 6.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) 5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-3738 Source: APPLE Type: Mailing List, Vendor Advisory APPLE-SA-2015-08-13-1 Source: APPLE Type: Mailing List, Vendor Advisory APPLE-SA-2015-08-13-3 Source: APPLE Type: Mailing List, Patch, Vendor Advisory APPLE-SA-2015-09-16-3 Source: SUSE Type: Mailing List, Third Party Advisory openSUSE-SU-2016:0761 Source: BID Type: Third Party Advisory, VDB Entry 76338 Source: CCN Type: BID-76338 WebKit Multiple Unspecified Memory Corruption Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1033274 Source: XF Type: UNKNOWN apple-safari-cve20153738-code-exec(105619) Source: CCN Type: Apple Web site About the security content of Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT205221 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/kb/HT205030 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/kb/HT205033 | ||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||
| |||||||||||||||||||||||||
BACK |