These issues were addressed through improved memory handling.ĬVE-2015-3723 : chaithanya (SegFault) working with HP's Zero Day InitiativeĬVE-2015-3724 : WanderingGlitch of HP's Zero Day Initiative Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code executionĭescription: Multiple memory corruption issues existed in the handling of ICC profiles. This issue was addressed with improved memory handling. Impact: Following a maliciously crafted URL may lead to arbitrary code executionĭescription: A memory corruption issue existed in handling of certain URL credentials. The complete list of certificates may be viewed at the iOS Trust Store. Impact: Update to the certificate trust policyĭescription: The certificate trust policy was updated. Further details are available about the security partial trust allow list. This issue was addressed through the addition of a mechanism to trust only a subset of certificates issued prior to the mis-issuance of the intermediate. Impact: An attacker with a privileged network position may be able to intercept network trafficĭescription: An intermediate certificate was incorrectly issued by the certificate authority CNNIC. This issue was addressed through improved collision checking.ĬVE-2015-3722 : Zhaofeng Chen, Hui Xue, and Tao (Lenx) Wei from FireEye, Inc. Impact: A malicious universal provisioning profile app may prevent apps from launchingĭescription: An issue existed in the install logic for universal provisioning profile apps, which allowed a collision to occur with existing bundle IDs. Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |