Vulnerability Name: | CVE-2016-1726 (CCN-109748) | ||||||||||||||||||||
Assigned: | 2016-01-19 | ||||||||||||||||||||
Published: | 2016-01-19 | ||||||||||||||||||||
Updated: | 2018-10-09 | ||||||||||||||||||||
Summary: | WebKit, as used in Apple iOS before 9.2.1 and Safari before 9.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1723 and CVE-2016-1725. | ||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-1726 Source: APPLE Type: Vendor Advisory APPLE-SA-2016-01-19-1 Source: APPLE Type: Vendor Advisory APPLE-SA-2016-01-19-3 Source: APPLE Type: UNKNOWN APPLE-SA-2016-03-21-2 Source: MISC Type: UNKNOWN http://packetstormsecurity.com/files/136227/WebKitGTK-Memory-Corruption-Denial-Of-Service.html Source: BUGTRAQ Type: UNKNOWN 20160311 WebKitGTK+ Security Advisory WSA-2016-0002 Source: BID Type: UNKNOWN 81263 Source: CCN Type: BID-81263 WebKit Multiple Security Vulnerabilities Source: SECTRACK Type: UNKNOWN 1034737 Source: XF Type: UNKNOWN apple-safari-cve20161726-code-exec(109748) Source: GENTOO Type: UNKNOWN GLSA-201706-15 Source: CCN Type: Apple Web site About the security content of Safari 9.0.3 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT205730 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT205732 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT206168 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |