WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to bypass the Same Origin Policy and obtain image date from an unintended web site via a timing attack involving an SVG document.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html | Mailing List Vendor Advisory |
https://support.apple.com/HT206905 | Vendor Advisory |
https://support.apple.com/HT206902 | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2016/Jul/msg00004.html | Mailing List Vendor Advisory |
https://support.apple.com/HT206900 | Vendor Advisory |
http://www.securityfocus.com/bid/91830 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1036343 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/539295/100/0/threaded | Third Party Advisory VDB Entry |
Information
Published : 2016-07-21 19:59
Updated : 2019-03-20 07:24
NVD link : CVE-2016-4583
Mitre link : CVE-2016-4583
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
apple
- tvos
- safari
- webkit
- iphone_os
webkitgtk
- webkitgtk\+