Apple iOS APPLE-SA-2015-09-16-1 Security Vulnerabilities
Apple iOS APPLE-SA-2015-09-16-1 Security Vulnerabilities
Release date:
Updated on:
Affected Systems:
Apple iOS 5.x
Apple iOS 4.x
Apple iOS 3.x
Description:
Bugtraq id: 76764
CVE (CAN) ID: CVE-2015-5916, CVE-2015-5850, CVE-2015-5856, CVE-2015-5862, CVE-2015-5898, CVE-2015-5885, CVE-2015-3801, CVE-2015-5912, CVE-2015-5858, CVE-2015-5860, CVE-2015-5841, CVE-2015-5824, CVE-2015-5880, CVE-2015-5829, CVE-2015-5876, CVE-2015-5855, CVE-2015-5834, CVE-2015-5848, CVE-2015-5867, CVE-2015-5844, CVE-2015-5845, CVE-2015-5846, CVE-2015-5843, CVE-2015-5863, CVE-2015-5832, CVE-2015-5816, CVE-2015-5822, CVE-2015-5823, CVE-2015-5868, CVE-2015-5896, CVE-2015-5903, CVE-2015-5882, CVE-2015-5879, CVE-2015-5869, CVE-2015-5899, CVE-2015-5857, CVE-2015-5851, CVE-2015-5831, CVE-2015-5837, CVE-2015-5840, CVE-2015-5904, CVE-2015-5905, CVE-2015-5764, CVE-2015-5765, CVE-2015-5767, CVE-2015-5835, CVE-2015-5892
IOS is an operating system developed by Apple for mobile devices. It supports iPhone, iPod touch, iPad, and Apple TV.
Versions earlier than iOS 9 have multiple security vulnerabilities, attackers can exploit these vulnerabilities to bypass security restrictions, obtain sensitive information, execute arbitrary code, cause denial of service, perform unauthorized operations, and obtain SYSTEM privileges.
<* Source: Xiaofeng Zheng
Tsinghua University
Sam Greenhalgh
Filippo Bigarella
*>
Test method:
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Suggestion:
Vendor patch:
Apple
-----
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://support.apple.com/HT205212
Http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html
Inconspicuous features in 10 iOS 9 make the iPhone easier to use
Official release, download, and upgrade of iOS 9
10 reasons why Apple iOS 9 is worth upgrading
IOS details: click here
This article permanently updates the link address: