The kernel in Apple iOS before 8.3, Apple OS X before 10.10.3, and Apple TV before 7.2 does not properly determine whether an IPv6 packet had a local origin, which allows remote attackers to bypass an intended network-filtering protection mechanism via a crafted packet.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://support.apple.com/HT204659 | vendor advisory |
https://support.apple.com/kb/HT204870 | |
http://lists.apple.com/archives/security-announce/2015/Apr/msg00002.html | vendor advisory |
http://www.securitytracker.com/id/1032048 | vdb entry |
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html | vendor advisory |
https://support.apple.com/HT204662 | vendor advisory |
http://lists.apple.com/archives/security-announce/2015/Apr/msg00003.html | vendor advisory |
https://support.apple.com/HT204661 | vendor advisory |