The Neighbor Discovery (ND) protocol implementation in the IPv6 stack in Apple iOS before 9 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2015/Sep/msg00001.html | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html | Vendor Advisory |
http://openwall.com/lists/oss-security/2015/04/04/2 | |
http://www.securityfocus.com/bid/76764 | |
http://www.securitytracker.com/id/1033609 | |
https://support.apple.com/HT205212 | Vendor Advisory |
https://support.apple.com/HT205213 | Vendor Advisory |
https://support.apple.com/HT205267 | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2015-09-18 12:00
Updated : 2024-02-28 15:21
NVD link : CVE-2015-5869
Mitre link : CVE-2015-5869
CVE.ORG link : CVE-2015-5869
JSON object : View
Products Affected
apple
- watchos
- iphone_os
- mac_os_x
CWE
CWE-20
Improper Input Validation