Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
                
            References
                    | Link | Resource | 
|---|---|
| http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html | Mailing List Patch Vendor Advisory | 
| http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html | Mailing List Vendor Advisory | 
| http://support.apple.com/kb/HT204941 | Vendor Advisory | 
| http://support.apple.com/kb/HT204942 | Vendor Advisory | 
| http://www.securityfocus.com/bid/75491 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1032760 | Third Party Advisory VDB Entry | 
Information
                Published : 2015-07-02 19:00
Updated : 2020-11-20 11:03
NVD link : CVE-2015-3717
Mitre link : CVE-2015-3717
JSON object : View
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
                apple
- mac_os_x
- iphone_os
sqlite
- sqlite


