The kernel in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1827, CVE-2016-1829, and CVE-2016-1830.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The kernel in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1827, CVE-2016-1829, and CVE-2016-1830.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://support.apple.com/HT206567 | x_refsource_CONFIRM |
http://www.securityfocus.com/bid/90691 | vdb-entry x_refsource_BID |
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html | vendor-advisory x_refsource_APPLE |
https://support.apple.com/HT206566 | x_refsource_CONFIRM |
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html | vendor-advisory x_refsource_APPLE |
https://support.apple.com/HT206564 | x_refsource_CONFIRM |
http://www.securitytracker.com/id/1035890 | vdb-entry x_refsource_SECTRACK |
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html | vendor-advisory x_refsource_APPLE |
https://support.apple.com/HT206568 | x_refsource_CONFIRM |
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html | vendor-advisory x_refsource_APPLE |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://support.apple.com/HT206567 | x_refsource_CONFIRM x_transferred |
http://www.securityfocus.com/bid/90691 | vdb-entry x_refsource_BID x_transferred |
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html | vendor-advisory x_refsource_APPLE x_transferred |
https://support.apple.com/HT206566 | x_refsource_CONFIRM x_transferred |
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html | vendor-advisory x_refsource_APPLE x_transferred |
https://support.apple.com/HT206564 | x_refsource_CONFIRM x_transferred |
http://www.securitytracker.com/id/1035890 | vdb-entry x_refsource_SECTRACK x_transferred |
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html | vendor-advisory x_refsource_APPLE x_transferred |
https://support.apple.com/HT206568 | x_refsource_CONFIRM x_transferred |
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html | vendor-advisory x_refsource_APPLE x_transferred |
The kernel in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1827, CVE-2016-1829, and CVE-2016-1830.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.0 | 7.8 | HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Primary | 2.0 | 9.3 | HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Hyperlink | Source | Resource |
---|---|---|
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html | product-security@apple.com | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html | product-security@apple.com | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html | product-security@apple.com | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html | product-security@apple.com | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/90691 | product-security@apple.com | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1035890 | product-security@apple.com | Third Party Advisory VDB Entry |
https://support.apple.com/HT206564 | product-security@apple.com | Vendor Advisory |
https://support.apple.com/HT206566 | product-security@apple.com | Vendor Advisory |
https://support.apple.com/HT206567 | product-security@apple.com | Vendor Advisory |
https://support.apple.com/HT206568 | product-security@apple.com | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://www.securityfocus.com/bid/90691 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1035890 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
https://support.apple.com/HT206564 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
https://support.apple.com/HT206566 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
https://support.apple.com/HT206567 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
https://support.apple.com/HT206568 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |