← Voltar para CVEs
CVE-2016-1819
N/ADescricao
Use-after-free vulnerability in the IOAccelContext2::clientMemoryForType method in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2016-1817 and CVE-2016-1818.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado5/20/2016
Ultima modificacao4/12/2025
Fontenvd
Avistamentos honeypot0
Produtos afetados
apple:iphone_osapple:mac_os_xapple:tvosapple:watchos
Fraquezas (CWE)
CWE-416
Referencias
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html(product-security@apple.com)
http://packetstormsecurity.com/files/137396/OS-X-Kernel-Use-After-Free-From-IOAcceleratorFamily2-Bad-Locking.html(product-security@apple.com)
http://www.securityfocus.com/bid/90694(product-security@apple.com)
http://www.securitytracker.com/id/1035890(product-security@apple.com)
https://bugs.chromium.org/p/project-zero/issues/detail?id=772(product-security@apple.com)
https://support.apple.com/HT206564(product-security@apple.com)
https://support.apple.com/HT206566(product-security@apple.com)
https://support.apple.com/HT206567(product-security@apple.com)
https://support.apple.com/HT206568(product-security@apple.com)
https://www.exploit-db.com/exploits/39928/(product-security@apple.com)
http://lists.apple.com/archives/security-announce/2016/May/msg00001.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00002.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00003.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.apple.com/archives/security-announce/2016/May/msg00004.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/137396/OS-X-Kernel-Use-After-Free-From-IOAcceleratorFamily2-Bad-Locking.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/90694(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1035890(af854a3a-2127-422b-91ae-364da2661108)
https://bugs.chromium.org/p/project-zero/issues/detail?id=772(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206564(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206566(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206567(af854a3a-2127-422b-91ae-364da2661108)
https://support.apple.com/HT206568(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/39928/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.