ID

VAR-201505-0078


CVE

CVE-2015-1155


TITLE

Apple Safari Used in etc. WebKit Vulnerability that can bypass the same origin policy in the implementation of history

Trust: 0.8

sources: JVNDB: JVNDB-2015-002545

DESCRIPTION

The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site. Apple Safari Used in etc. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Safari. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of popups to invalid pages. The issue lies in the ability to control the history of a window with higher privileges. An attacker can leverage this vulnerability to execute code outside the context of the Safari sandbox. Successful exploits may allow the attacker to gain access to sensitive information. Information obtained may lead to further attacks. Apple Safari is a web browser of Apple (Apple), the default browser included with Mac OS X and iOS operating systems. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. The following versions are affected: Apple Safari prior to 6.2.6, 7.x prior to 7.1.6, and 8.x prior to 8.0.6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-06-30-1 iOS 8.4 iOS 8.4 is now available and addresses the following: Application Store Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious universal provisioning profile app may prevent apps from launching Description: An issue existed in the install logic for universal provisioning profile apps, which allowed a collision to occur with existing bundle IDs. This issue was addressed through improved collision checking. CVE-ID CVE-2015-3722 : Zhaofeng Chen, Hui Xue, and Tao (Lenx) Wei from FireEye, Inc. Certificate Trust Policy Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker with a privileged network position may be able to intercept network traffic Description: An intermediate certificate was incorrectly issued by the certificate authority CNNIC. This issue was addressed through the addition of a mechanism to trust only a subset of certificates issued prior to the mis-issuance of the intermediate. Further details are available at https://support.apple.com/en-us/HT204938 Certificate Trust Policy Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Update to the certificate trust policy Description: The certificate trust policy was updated. The complete list of certificates may be viewed at https://support.apple.com/en- us/HT204132 CFNetwork HTTPAuthentication Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Following a maliciously crafted URL may lead to arbitrary code execution Description: A memory corruption issue existed in handling of certain URL credentials. This issue was addressed with improved memory handling. CVE-ID CVE-2015-3684 : Apple CoreGraphics Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in the handling of ICC profiles. These issues were addressed through improved memory handling. CVE-ID CVE-2015-3723 : chaithanya (SegFault) working with HP's Zero Day Initiative CVE-2015-3724 : WanderingGlitch of HP's Zero Day Initiative CoreText Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted text file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in the processing of text files. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-1157 CVE-2015-3685 : Apple CVE-2015-3686 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-3687 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-3688 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-3689 : Apple coreTLS Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker with a privileged network position may intercept SSL/TLS connections Description: coreTLS accepted short ephemeral Diffie-Hellman (DH) keys, as used in export-strength ephemeral DH cipher suites. This issue, also known as Logjam, allowed an attacker with a privileged network position to downgrade security to 512-bit DH if the server supported an export-strength ephemeral DH cipher suite. The issue was addressed by increasing the default minimum size allowed for DH ephemeral keys to 768 bits. CVE-ID CVE-2015-4000 : The weakdh team at weakdh.org, Hanno Boeck DiskImages Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to determine kernel memory layout Description: An information disclosure issue existed in the processing of disk images. This issue was addressed through improved memory management. CVE-ID CVE-2015-3690 : Peter Rutenbar working with HP's Zero Day Initiative FontParser Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted font file may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in the processing of font files. These issues were addressed through improved input validation. CVE-ID CVE-2015-3694 : John Villamil (@day6reak), Yahoo Pentest Team CVE-2015-3719 : John Villamil (@day6reak), Yahoo Pentest Team ImageIO Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Processing a maliciously crafted .tiff file may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the processing of .tiff files. This issue was addressed with improved bounds checking. CVE-ID CVE-2015-3703 : Apple ImageIO Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Multiple vulnerabilities exist in libtiff, the most serious of which may lead to arbitrary code execution Description: Multiple vulnerabilities existed in libtiff versions prior to 4.0.4. They were addressed by updating libtiff to version 4.0.4. CVE-ID CVE-2014-8127 CVE-2014-8128 CVE-2014-8129 CVE-2014-8130 Kernel Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious application may be able to determine kernel memory layout Description: A memory management issue existed in the handling of HFS parameters which could have led to the disclosure of kernel memory layout. This issue was addressed through improved memory management. CVE-ID CVE-2015-3721 : Ian Beer of Google Project Zero Mail Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A maliciously crafted email can replace the message content with an arbitrary webpage when the message is viewed Description: An issue existed in the support for HTML email which allowed message content to be refreshed with an arbitrary webpage. The issue was addressed through restricted support for HTML content. CVE-ID CVE-2015-3710 : Aaron Sigel of vtty.com, Jan Soucek MobileInstallation Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious universal provisioning profile app can prevent a Watch app from launching Description: An issue existed in the install logic for universal provisioning profile apps on the Watch which allowed a collision to occur with existing bundle IDs. This issue was addressed through improved collision checking. CVE-ID CVE-2015-3725 : Zhaofeng Chen, Hui Xue, and Tao (Lenx) Wei from FireEye, Inc. Safari Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may compromise user information on the filesystem Description: A state management issue existed in Safari that allowed unprivileged origins to access contents on the filesystem. This issue was addressed through improved state management. CVE-ID CVE-2015-1155 : Joe Vennix of Rapid7 Inc. working with HP's Zero Day Initiative Safari Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to account takeover Description: An issue existed where Safari would preserve the Origin request header for cross-origin redirects, allowing malicious websites to circumvent CSRF protections. The issue was addressed through improved handling of redirects. CVE-ID CVE-2015-3658 : Brad Hill of Facebook Security Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A remote attacker may cause an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the Security framework code for parsing S/MIME e-mail and some other signed or encrypted objects. This issue was addressed through improved validity checking. CVE-ID CVE-2013-1741 SQLite Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A remote attacker may cause an unexpected application termination or arbitrary code execution Description: Multiple buffer overflows existed in SQLite's printf implementation. These issues were addressed through improved bounds checking. CVE-ID CVE-2015-3717 : Peter Rutenbar working with HP's Zero Day Initiative Telephony Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Maliciously crafted SIM cards may lead to arbitrary code execution Description: Multiple input validation issues existed in the parsing of SIM/UIM payloads. These issues were addressed through improved payload validation. CVE-ID CVE-2015-3726 : Matt Spisak of Endgame WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a malicious website by clicking a link may lead to user interface spoofing Description: An issue existed in the handling of the rel attribute in anchor elements. Target objects could get unauthorized access to link objects. This issue was addressed through improved link type adherence. CVE-ID CVE-2015-1156 : Zachary Durber of Moodle WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2015-1152 : Apple CVE-2015-1153 : Apple WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted webpage may lead to an unexpected application termination or arbitrary code execution Description: An insufficient comparison issue existed in SQLite authorizer which allowed invocation of arbitrary SQL functions. This issue was addressed with improved authorization checks. CVE-ID CVE-2015-3659 : Peter Rutenbar working with HP's Zero Day Initiative WebKit Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A maliciously crafted website can access the WebSQL databases of other websites Description: An issue existed in the authorization checks for renaming WebSQL tables which could have allowed a maliciously crafted website to access databases belonging to other websites. This was addressed through improved authorization checks. CVE-ID CVE-2015-3727 : Peter Rutenbar working with HP's Zero Day Initiative WiFi Connectivity Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later Impact: iOS devices may auto-associate with untrusted access points advertising a known ESSID but with a downgraded security type Description: An insufficient comparison issue existed in WiFi manager's evaluation of known access point advertisements. This issue was addressed through improved matching of security parameters. CVE-ID CVE-2015-3728 : Brian W. Gray of Carnegie Mellon University, Craig Young from TripWire Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "8.4". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2 Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJVkr+6AAoJEBcWfLTuOo7tfDwP/1db2KLgQP+Pyb6av5awgS4m hQul1ihU0JO8jAI2ww345v6jMFq7MIAs82DobbRwqtI97aTep5bieqr5qUautlFz NtC4VQ5PsAyEoTo0cOSpvFOV3av6BdwFeNTI4w39n+bvKn6YUSJD0zswknUtI/G7 lpFx/KxvKBkXBhWWCg3cyVlo3Jap88svlyh9MZ+C0BYFyjZ+ZjYMlDZ6FdzRyBxI 4RHaXUFrtMQk3JAeIadSbevOH2mUwlCB9vDmFOC5BFTrMYV8nd3gyXMy924wLQli l3gtx+Kgq3+i71Zay7HGmshv06vZop8X82fC/lNZmTQFfNABLLug0ve0tLH9+IRm 516Yb4UxUZ51Pnhbv1wvwqATGoJpK4oFXHsTx0rCVpkcxGMLmeYRyaxQYBUzh+ns +9tcuqIBsvVudY8LGAF4yUxkmt2K5N6mqu9x+KqVmiI9M7DbBoc+AUNVJpoiEGmt qB/eqkpGYKvHal3UEV6P3sSM3gBrzb5aFYNa8R31/cE8U+INeKTwd99KNoixJa9y /rNOSnuwKsuD33NFUpOJo/MW70ts3BrjN8eIvtnZ7/GHVljkQde7LCCJ2k2iQWTW lp+C5jWsR/2qXoCkG1p2oipBP/2OKo9wRzklkOo+1LJiWY18r/FlRMWqfkFUyMrK +NEpxWhe8ytzIFIkrXDt =iv++ -----END PGP SIGNATURE----- . ============================================================================ Ubuntu Security Notice USN-2937-1 March 21, 2016 webkitgtk vulnerabilities ============================================================================ A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.10 - Ubuntu 14.04 LTS Summary: Several security issues were fixed in WebKitGTK+. Software Description: - webkitgtk: Web content engine library for GTK+ Details: A large number of security issues were discovered in the WebKitGTK+ Web and JavaScript engines. If a user were tricked into viewing a malicious website, a remote attacker could exploit a variety of issues related to web browser security, including cross-site scripting attacks, denial of service attacks, and arbitrary code execution. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.10: libjavascriptcoregtk-1.0-0 2.4.10-0ubuntu0.15.10.1 libjavascriptcoregtk-3.0-0 2.4.10-0ubuntu0.15.10.1 libwebkitgtk-1.0-0 2.4.10-0ubuntu0.15.10.1 libwebkitgtk-3.0-0 2.4.10-0ubuntu0.15.10.1 Ubuntu 14.04 LTS: libjavascriptcoregtk-1.0-0 2.4.10-0ubuntu0.14.04.1 libjavascriptcoregtk-3.0-0 2.4.10-0ubuntu0.14.04.1 libwebkitgtk-1.0-0 2.4.10-0ubuntu0.14.04.1 libwebkitgtk-3.0-0 2.4.10-0ubuntu0.14.04.1 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK+, such as Epiphany and Evolution, to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2937-1 CVE-2014-1748, CVE-2015-1071, CVE-2015-1076, CVE-2015-1081, CVE-2015-1083, CVE-2015-1120, CVE-2015-1122, CVE-2015-1127, CVE-2015-1153, CVE-2015-1155, CVE-2015-3658, CVE-2015-3659, CVE-2015-3727, CVE-2015-3731, CVE-2015-3741, CVE-2015-3743, CVE-2015-3745, CVE-2015-3747, CVE-2015-3748, CVE-2015-3749, CVE-2015-3752, CVE-2015-5788, CVE-2015-5794, CVE-2015-5801, CVE-2015-5809, CVE-2015-5822, CVE-2015-5928 Package Information: https://launchpad.net/ubuntu/+source/webkitgtk/2.4.10-0ubuntu0.15.10.1 https://launchpad.net/ubuntu/+source/webkitgtk/2.4.10-0ubuntu0.14.04.1

Trust: 2.97

sources: NVD: CVE-2015-1155 // JVNDB: JVNDB-2015-002545 // ZDI: ZDI-15-228 // BID: 74527 // VULHUB: VHN-79116 // VULMON: CVE-2015-1155 // PACKETSTORM: 132517 // PACKETSTORM: 136327 // PACKETSTORM: 131803

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.0.6

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.0

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:7.1.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:8.0.4

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.1.4

Trust: 1.3

vendor:applemodel:safariscope:eqversion:8.0.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:8.0.5

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.1.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.1.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:8.0.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.1.5

Trust: 1.3

vendor:applemodel:safariscope:eqversion:7.1.3

Trust: 1.3

vendor:applemodel:safariscope:eqversion:8.0.3

Trust: 1.3

vendor:applemodel:safariscope:lteversion:6.2.5

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:8.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:8.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.2.5

Trust: 0.9

vendor:applemodel:safariscope:ltversion:(os x yosemite v10.10.3)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:6.2.6

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(ipad 2 or later )

Trust: 0.8

vendor:applemodel:safariscope:eqversion:7.1.6

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(iphone 4s or later )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:iosscope:ltversion:(ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.x (os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.x (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x yosemite v10.10.3)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:iosscope:eqversion:8.4

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:8.0.6

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.x (os x yosemite v10.10.3)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope: - version: -

Trust: 0.7

vendor:applemodel:iphone osscope:eqversion:8.3

Trust: 0.6

vendor:applemodel:iosscope:eqversion:8

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.4.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:safariscope:neversion:7.1.6

Trust: 0.3

vendor:applemodel:safariscope:neversion:6.2.6

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.2

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.4.8

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.31

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.3

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.6.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.7.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.2

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:8.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.8.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.3

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:64

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:iosscope:neversion:8.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.7.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.4

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.8.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.8

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.5

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.6.4

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.7.4

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.34

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.4.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.1.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:7.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.4.7

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.6.6

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.7.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.10.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.52

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.6.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.31

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.28

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:safariscope:neversion:8.0.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.1.1

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.4.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:ios for developerscope:eqversion:6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.5

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:neversion:2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.6.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.3

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.4.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.1.6

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.9.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.33

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.30

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.4.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.8.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.6.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:8.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.2.2

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.8.4

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:themodel:webkitgtk+ team webkitgtk+scope:eqversion:2.4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

sources: ZDI: ZDI-15-228 // BID: 74527 // JVNDB: JVNDB-2015-002545 // CNNVD: CNNVD-201505-053 // NVD: CVE-2015-1155

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-1155
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-1155
value: MEDIUM

Trust: 0.8

ZDI: CVE-2015-1155
value: HIGH

Trust: 0.7

CNNVD: CNNVD-201505-053
value: MEDIUM

Trust: 0.6

VULHUB: VHN-79116
value: MEDIUM

Trust: 0.1

VULMON: CVE-2015-1155
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-1155
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

ZDI: CVE-2015-1155
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.7

VULHUB: VHN-79116
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: ZDI: ZDI-15-228 // VULHUB: VHN-79116 // VULMON: CVE-2015-1155 // JVNDB: JVNDB-2015-002545 // CNNVD: CNNVD-201505-053 // NVD: CVE-2015-1155

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-79116 // JVNDB: JVNDB-2015-002545 // NVD: CVE-2015-1155

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 136327 // CNNVD: CNNVD-201505-053

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201505-053

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002545

PATCH

title:HT204826url:http://support.apple.com/en-us/HT204826

Trust: 1.5

title:APPLE-SA-2015-05-06-1 Safari 8.0.6, Safari 7.1.6, and Safari 6.2.6url:http://lists.apple.com/archives/security-announce/2015/May/msg00000.html

Trust: 0.8

title:APPLE-SA-2015-06-30-1 iOS 8.4url:http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html

Trust: 0.8

title:HT204941url:http://support.apple.com/en-us/HT204941

Trust: 0.8

title:HT204826url:http://support.apple.com/ja-jp/HT204826

Trust: 0.8

title:HT204941url:http://support.apple.com/ja-jp/HT204941

Trust: 0.8

title:The Registerurl:https://www.theregister.co.uk/2015/05/07/apple_swats_webkit_bugs_that_bit_it_on_safari/

Trust: 0.2

title:Apple: Safari 8.0.6, Safari 7.1.6, and Safari 6.2.6url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=5390fb0ff76f6297e2be71c3845ae066

Trust: 0.1

title:Ubuntu Security Notice: webkitgtk vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-2937-1

Trust: 0.1

title:Threatposturl:https://threatpost.com/apple-fixes-webkit-vulnerabilities-in-safari-browser/112670/

Trust: 0.1

sources: ZDI: ZDI-15-228 // VULMON: CVE-2015-1155 // JVNDB: JVNDB-2015-002545

EXTERNAL IDS

db:NVDid:CVE-2015-1155

Trust: 3.9

db:BIDid:74527

Trust: 1.5

db:SECTRACKid:1032270

Trust: 1.2

db:ZDIid:ZDI-15-228

Trust: 1.0

db:JVNid:JVNVU94416388

Trust: 0.8

db:JVNDBid:JVNDB-2015-002545

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-2783

Trust: 0.7

db:CNNVDid:CNNVD-201505-053

Trust: 0.7

db:SECUNIAid:64409

Trust: 0.6

db:VULHUBid:VHN-79116

Trust: 0.1

db:VULMONid:CVE-2015-1155

Trust: 0.1

db:PACKETSTORMid:132517

Trust: 0.1

db:PACKETSTORMid:136327

Trust: 0.1

db:PACKETSTORMid:131803

Trust: 0.1

sources: ZDI: ZDI-15-228 // VULHUB: VHN-79116 // VULMON: CVE-2015-1155 // BID: 74527 // JVNDB: JVNDB-2015-002545 // PACKETSTORM: 132517 // PACKETSTORM: 136327 // PACKETSTORM: 131803 // CNNVD: CNNVD-201505-053 // NVD: CVE-2015-1155

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/may/msg00000.html

Trust: 1.8

url:https://support.apple.com/ht204826

Trust: 1.8

url:http://www.ubuntu.com/usn/usn-2937-1

Trust: 1.3

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00001.html

Trust: 1.2

url:http://www.securityfocus.com/bid/74527

Trust: 1.2

url:http://support.apple.com/kb/ht204941

Trust: 1.2

url:http://www.securitytracker.com/id/1032270

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html

Trust: 1.2

url:http://lists.opensuse.org/opensuse-updates/2016-03/msg00132.html

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1155

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94416388/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1155

Trust: 0.8

url:https://support.apple.com/en-us/ht204826

Trust: 0.7

url:http://secunia.com/advisories/64409

Trust: 0.6

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.apple.com/safari/

Trust: 0.3

url:https://support.apple.com/en-ie/ht204826

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-228/

Trust: 0.3

url:http://webkitgtk.org/security/wsa-2015-0002.html

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1155

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1153

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-3658

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-3659

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1152

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2015-1156

Trust: 0.2

url:http://gpgtools.org

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=38891

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.rapid7.com/db/modules/auxiliary/gather/safari_file_url_navigation

Trust: 0.1

url:https://usn.ubuntu.com/2937-1/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3684

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3687

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3719

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3724

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3685

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3703

Trust: 0.1

url:https://support.apple.com/en-us/ht204938

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3688

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8127

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1741

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8128

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3686

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3721

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3723

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3690

Trust: 0.1

url:https://support.apple.com/en-

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3689

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3710

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-8129

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1157

Trust: 0.1

url:https://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3717

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3722

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3694

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5809

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1127

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1120

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3741

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1083

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5788

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3727

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5822

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3752

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1076

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkitgtk/2.4.10-0ubuntu0.15.10.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5794

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1071

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3749

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1122

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-1748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1081

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3731

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-5801

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3743

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3747

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-3745

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkitgtk/2.4.10-0ubuntu0.14.04.1

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1154

Trust: 0.1

url:http://support.apple.com/kb/ht201222

Trust: 0.1

sources: ZDI: ZDI-15-228 // VULHUB: VHN-79116 // VULMON: CVE-2015-1155 // BID: 74527 // JVNDB: JVNDB-2015-002545 // PACKETSTORM: 132517 // PACKETSTORM: 136327 // PACKETSTORM: 131803 // CNNVD: CNNVD-201505-053 // NVD: CVE-2015-1155

CREDITS

Joe Vennix of Rapid7 Inc.

Trust: 0.7

sources: ZDI: ZDI-15-228

SOURCES

db:ZDIid:ZDI-15-228
db:VULHUBid:VHN-79116
db:VULMONid:CVE-2015-1155
db:BIDid:74527
db:JVNDBid:JVNDB-2015-002545
db:PACKETSTORMid:132517
db:PACKETSTORMid:136327
db:PACKETSTORMid:131803
db:CNNVDid:CNNVD-201505-053
db:NVDid:CVE-2015-1155

LAST UPDATE DATE

2025-04-13T20:48:26.335000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-15-228date:2015-05-15T00:00:00
db:VULHUBid:VHN-79116date:2017-01-03T00:00:00
db:VULMONid:CVE-2015-1155date:2017-01-03T00:00:00
db:BIDid:74527date:2016-02-02T20:04:00
db:JVNDBid:JVNDB-2015-002545date:2015-07-07T00:00:00
db:CNNVDid:CNNVD-201505-053date:2015-05-08T00:00:00
db:NVDid:CVE-2015-1155date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:ZDIid:ZDI-15-228date:2015-05-15T00:00:00
db:VULHUBid:VHN-79116date:2015-05-08T00:00:00
db:VULMONid:CVE-2015-1155date:2015-05-08T00:00:00
db:BIDid:74527date:2015-05-06T00:00:00
db:JVNDBid:JVNDB-2015-002545date:2015-05-11T00:00:00
db:PACKETSTORMid:132517date:2015-07-01T03:28:44
db:PACKETSTORMid:136327date:2016-03-22T00:03:33
db:PACKETSTORMid:131803date:2015-05-07T15:53:40
db:CNNVDid:CNNVD-201505-053date:2015-05-08T00:00:00
db:NVDid:CVE-2015-1155date:2015-05-08T00:59:03.953