Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2015-8659
Deferred
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-12 Jan, 2016 | 19:59
Updated At-12 Apr, 2025 | 10:46

The idle stream handling in nghttp2 before 1.6.0 allows attackers to have unspecified impact via unknown vectors, aka a heap-use-after-free bug.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.010.0CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Apple Inc.
apple
>>mac_os_x>>Versions up to 10.11.3(inclusive)
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
nghttp2
nghttp2
>>nghttp2>>Versions up to 1.5.0(inclusive)
cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>Versions up to 9.2.1(inclusive)
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>tvos>>Versions up to 9.1(inclusive)
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
Apple Inc.
apple
>>watchos>>Versions up to 2.1(inclusive)
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.htmlcve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.htmlcve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.htmlcve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.htmlcve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175085.htmlcve@mitre.org
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175423.htmlcve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2015/12/23/10cve@mitre.org
N/A
http://www.openwall.com/lists/oss-security/2015/12/23/6cve@mitre.org
N/A
http://www.securitytracker.com/id/1035353cve@mitre.org
N/A
https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/cve@mitre.org
Patch
Vendor Advisory
https://security.gentoo.org/glsa/201612-06cve@mitre.org
N/A
https://support.apple.com/HT206166cve@mitre.org
Vendor Advisory
https://support.apple.com/HT206167cve@mitre.org
Vendor Advisory
https://support.apple.com/HT206168cve@mitre.org
Vendor Advisory
https://support.apple.com/HT206169cve@mitre.org
Vendor Advisory
http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175085.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175423.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2015/12/23/10af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.openwall.com/lists/oss-security/2015/12/23/6af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id/1035353af854a3a-2127-422b-91ae-364da2661108
N/A
https://nghttp2.org/blog/2015/12/23/nghttp2-v1-6-0/af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
https://security.gentoo.org/glsa/201612-06af854a3a-2127-422b-91ae-364da2661108
N/A
https://support.apple.com/HT206166af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://support.apple.com/HT206167af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://support.apple.com/HT206168af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://support.apple.com/HT206169af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Change History
0Changes found

Details not found