Heap-based buffer overflow in the DNS client library in configd in Apple iOS before 9.1, OS X before 10.11.1, and watchOS before 2.0.1 allows attackers to execute arbitrary code via a crafted app that sends a spoofed configd response to a client.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: apple
Published:
Updated: 2024-08-06T07:36:35.228Z
Reserved: 2015-09-16T00:00:00
Link: CVE-2015-7015

No data.

Status : Modified
Published: 2015-10-23T21:59:49.910
Modified: 2024-11-21T02:36:03.190
Link: CVE-2015-7015

No data.