Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html | Mailing List Patch Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html | Mailing List Vendor Advisory |
http://support.apple.com/kb/HT204941 | Vendor Advisory |
http://support.apple.com/kb/HT204942 | Vendor Advisory |
http://www.securityfocus.com/bid/75491 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1032760 | Third Party Advisory VDB Entry |
Information
Published : 2015-07-02 19:00
Updated : 2020-11-20 11:03
NVD link : CVE-2015-3717
Mitre link : CVE-2015-3717
JSON object : View
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Products Affected
apple
- mac_os_x
- iphone_os
sqlite
- sqlite