Vulnerability Name: | CVE-2016-1858 (CCN-113246) | ||||||||||||||||||||
Assigned: | 2016-05-16 | ||||||||||||||||||||
Published: | 2016-05-16 | ||||||||||||||||||||
Updated: | 2019-03-25 | ||||||||||||||||||||
Summary: | WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, improperly tracks taint attributes, which allows remote attackers to obtain sensitive information via a crafted web site. | ||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||||||
Vulnerability Consequences: | Obtain Information | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-1858 Source: APPLE Type: Mailing List, Vendor Advisory APPLE-SA-2016-05-16-1 Source: APPLE Type: Mailing List, Vendor Advisory APPLE-SA-2016-05-16-2 Source: APPLE Type: Mailing List, Vendor Advisory APPLE-SA-2016-05-16-5 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20160530 WebKitGTK+ Security Advisory WSA-2016-0004 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1035888 Source: XF Type: UNKNOWN apple-safari-cve20161858-info-disc(113246) Source: CCN Type: Apple Web site About the security content of Safari 9.1.1 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT206564 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT206565 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT206568 Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-1858 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |