ID

VAR-201510-0163


CVE

CVE-2015-6999


TITLE

Apple iOS of OCSP Client forged valid certificate vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-005531

DESCRIPTION

The OCSP client in Apple iOS before 9.1 does not check for certificate expiry, which allows remote attackers to spoof a valid certificate by leveraging access to a revoked certificate. Supplementary information : CWE Vulnerability type by CWE-254: Security Features ( Security function ) Has been identified. Apple iOS is prone to multiple security vulnerabilities. Attackers can exploit these issues to bypass security restrictions, obtain sensitive information, execute arbitrary code and cause a denial-of-service condition; this may aid in launching further attacks. Versions prior to iOS 9.1 are vulnerable. Apple iOS is an operating system developed by Apple (Apple) for mobile devices

Trust: 1.98

sources: NVD: CVE-2015-6999 // JVNDB: JVNDB-2015-005531 // BID: 77268 // VULHUB: VHN-84960

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:lteversion:9.0.2

Trust: 1.0

vendor:applemodel:iosscope:ltversion:9.1 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:9.1 (iphone 4s or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:9.1 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:9.0.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

sources: BID: 77268 // JVNDB: JVNDB-2015-005531 // CNNVD: CNNVD-201510-500 // NVD: CVE-2015-6999

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-6999
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-6999
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201510-500
value: MEDIUM

Trust: 0.6

VULHUB: VHN-84960
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-6999
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-84960
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-84960 // JVNDB: JVNDB-2015-005531 // CNNVD: CNNVD-201510-500 // NVD: CVE-2015-6999

PROBLEMTYPE DATA

problemtype:CWE-254

Trust: 1.1

problemtype:CWE-Other

Trust: 0.8

sources: VULHUB: VHN-84960 // JVNDB: JVNDB-2015-005531 // NVD: CVE-2015-6999

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201510-500

TYPE

Unknown

Trust: 0.3

sources: BID: 77268

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-005531

PATCH

title:Apple security updatesurl:https://support.apple.com/en-us/HT201222

Trust: 0.8

title:APPLE-SA-2015-10-21-1 iOS 9.1url:http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html

Trust: 0.8

title:HT205370url:https://support.apple.com/en-us/HT205370

Trust: 0.8

title:HT205370url:http://support.apple.com/ja-jp/HT205370

Trust: 0.8

title:Apple iOS OCSP Repair measures for client security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58344

Trust: 0.6

sources: JVNDB: JVNDB-2015-005531 // CNNVD: CNNVD-201510-500

EXTERNAL IDS

db:NVDid:CVE-2015-6999

Trust: 2.8

db:BIDid:77268

Trust: 1.4

db:SECTRACKid:1033929

Trust: 1.1

db:JVNid:JVNVU92655282

Trust: 0.8

db:JVNDBid:JVNDB-2015-005531

Trust: 0.8

db:CNNVDid:CNNVD-201510-500

Trust: 0.7

db:VULHUBid:VHN-84960

Trust: 0.1

sources: VULHUB: VHN-84960 // BID: 77268 // JVNDB: JVNDB-2015-005531 // CNNVD: CNNVD-201510-500 // NVD: CVE-2015-6999

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/oct/msg00002.html

Trust: 1.7

url:https://support.apple.com/ht205370

Trust: 1.7

url:http://www.securityfocus.com/bid/77268

Trust: 1.1

url:http://www.securitytracker.com/id/1033929

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6999

Trust: 0.8

url:http://jvn.jp/vu/jvnvu92655282/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6999

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

url:http://www.apple.com/ipad/

Trust: 0.3

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

sources: VULHUB: VHN-84960 // BID: 77268 // JVNDB: JVNDB-2015-005531 // CNNVD: CNNVD-201510-500 // NVD: CVE-2015-6999

CREDITS

PanguTeam, Proteas of Qihoo 360 Nirvan Team, Sergi Alvarez (pancake) of NowSecure Research Team, William Redwood of Hampton School and Andreas Kurtz of NESO Security Labs.

Trust: 0.3

sources: BID: 77268

SOURCES

db:VULHUBid:VHN-84960
db:BIDid:77268
db:JVNDBid:JVNDB-2015-005531
db:CNNVDid:CNNVD-201510-500
db:NVDid:CVE-2015-6999

LAST UPDATE DATE

2025-04-13T20:55:17.066000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-84960date:2016-12-24T00:00:00
db:BIDid:77268date:2016-01-12T01:57:00
db:JVNDBid:JVNDB-2015-005531date:2015-10-26T00:00:00
db:CNNVDid:CNNVD-201510-500date:2015-10-26T00:00:00
db:NVDid:CVE-2015-6999date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-84960date:2015-10-23T00:00:00
db:BIDid:77268date:2015-10-21T00:00:00
db:JVNDBid:JVNDB-2015-005531date:2015-10-26T00:00:00
db:CNNVDid:CNNVD-201510-500date:2015-10-26T00:00:00
db:NVDid:CVE-2015-6999date:2015-10-23T10:59:08.413