← Retour aux CVEs
CVE-2016-4608
CRITICAL9.8
Description
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4607, CVE-2016-4609, CVE-2016-4610, and CVE-2016-4612.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie7/22/2016
Derniere modification4/12/2025
Sourcenvd
Observations honeypot0
Produits affectes
apple:icloudapple:iphone_osapple:itunesapple:mac_os_xapple:tvosapple:watchosfedoraproject:fedoramicrosoft:windowsxmlsoft:libxslt
Faiblesses (CWE)
CWE-119
References
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html(product-security@apple.com)
http://www.securityfocus.com/bid/91826(product-security@apple.com)
http://www.securitytracker.com/id/1036348(product-security@apple.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/(product-security@apple.com)
https://support.apple.com/HT206899(product-security@apple.com)
https://support.apple.com/HT206901(product-security@apple.com)
https://support.apple.com/HT206902(product-security@apple.com)
https://support.apple.com/HT206903(product-security@apple.com)
https://support.apple.com/HT206904(product-security@apple.com)
https://support.apple.com/HT206905(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/91826(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1036348(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206899(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206901(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206902(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206903(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206904(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206905(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.