XNU in the kernel in Apple iOS before 9 does not properly validate the headers of TCP packets, which allows remote attackers to bypass the sequence-number protection mechanism and cause a denial of service (TCP connection disruption) via a crafted header.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1033609 | vdb entry |
https://support.apple.com/HT205212 | vendor advisory |
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html | vendor advisory |
http://www.securityfocus.com/bid/76764 | vdb entry |
https://support.apple.com/HT205267 | vendor advisory |
http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html | vendor advisory |