Vulnerability Details : CVE-2016-4769
WebKit in Apple iTunes before 12.5.1 on Windows and Safari before 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2016-4769
- cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
- cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-4769
0.70%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-4769
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2016-4769
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-4769
-
http://www.securityfocus.com/bid/93062
Apple iTunes and Safari CVE-2016-4769 Memory Corruption Vulnerability
-
http://lists.apple.com/archives/security-announce/2016/Sep/msg00012.html
Apple - Lists.apple.comMailing List;Vendor Advisory
-
https://support.apple.com/HT207158
About the security content of iTunes 12.5.1 for Windows - Apple SupportVendor Advisory
-
http://lists.apple.com/archives/security-announce/2016/Sep/msg00007.html
Apple - Lists.apple.comMailing List;Vendor Advisory
-
https://support.apple.com/HT207157
About the security content of Safari 10 - Apple SupportVendor Advisory
-
http://www.securitytracker.com/id/1036854
Apple Safari Multiple Bugs Let Remote Users Obtain Potentially Sensitive Information, Spoof the Address Bar, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code - SecurityTracker
Jump to