Vulnerability Name: | CVE-2016-4592 (CCN-115690) | ||||||||||||||||||||
Assigned: | 2016-07-21 | ||||||||||||||||||||
Published: | 2016-07-21 | ||||||||||||||||||||
Updated: | 2019-03-20 | ||||||||||||||||||||
Summary: | WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to cause a denial of service (memory consumption) via a crafted web site. | ||||||||||||||||||||
CVSS v3 Severity: | 6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.1 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-400 | ||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-4592 Source: APPLE Type: Mailing List, Vendor Advisory APPLE-SA-2016-07-18-2 Source: APPLE Type: Mailing List, Vendor Advisory APPLE-SA-2016-07-18-4 Source: APPLE Type: Mailing List, Vendor Advisory APPLE-SA-2016-07-18-5 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html Source: BUGTRAQ Type: Third Party Advisory, VDB Entry 20160825 WebKitGTK+ Security Advisory WSA-2016-0005 Source: BID Type: Third Party Advisory, VDB Entry 91830 Source: CCN Type: BID-91830 Apple iOS/tvOS/Safari Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1036343 Source: XF Type: UNKNOWN apple-safari-cve20164592-dos(115690) Source: CCN Type: Apple Web site About the security content of Safari 9.1.2 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT206900 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT206902 Source: CONFIRM Type: Vendor Advisory https://support.apple.com/HT206905 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |