Memory corruption in Apple Inc. products - CVE-2016-4584
Published: July 19, 2016 / Updated: November 22, 2018
Vulnerability identifier: #VU168
CSH Severity: Critical
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Red
CVE-ID: CVE-2016-4584
CWE-ID: CWE-119
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Apple Inc.
Affected software:
Apple Safari
Apple iOS
tvOS
Apple Safari
Apple iOS
tvOS
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to input validation error in Apple Safari. A remote unauthenticated attacker can cause arbitrary code execution by creating a specially crafted web site that, when loaded by the target user, will trigger a memory corruption error in WebKit.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
The vulnerability exists due to input validation error in Apple Safari. A remote unauthenticated attacker can cause arbitrary code execution by creating a specially crafted web site that, when loaded by the target user, will trigger a memory corruption error in WebKit.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2016-4584
The vendor has issued a fix (9.1.2).