

This issue was addressed through improved validation of executable files.
#Lots of apple sandbox violations code#
Impact: A specially crafted executable file could allow unsigned, malicious code to executeĭescription: An issue existed in the way multi-architecture executable files were evaluated that could have allowed unsigned code to be executed. This issue was addressed through improved code signature validation. Impact: A malicious application may be able to execute unsigned codeĭescription: An issue existed that allowed unsigned code to be appended to signed code in a specially crafted executable file. This issue was addressed by improving the third-party sandbox profile.ĬVE-2015-3793 : Andreas Weinlein of the Appthority Mobility Threat Team Impact: A malicious app may be able to read other apps' managed preferencesĭescription: An issue existed in the third-party app sandbox.

This issue was addressed through improved state handling.ĬVE-2015-3782 : Deepkanwal Plaha of University of Toronto

Impact: A malicious application may be able to access the iCloud user record of a previously signed in userĭescription: A state inconsistency existed in CloudKit when signing out users. This issue was addressed through improved state management. Impact: An attacker with a privileged network position may be able to accept untrusted certificates from the lock screenĭescription: Under certain circumstances, the device may have presented a certificate trust dialog while in a locked state.
#Lots of apple sandbox violations mac#
This issue was addressed by broadcasting only MAC addresses associated with the current SSID.ĬVE-2015-3778 : Piers O'Hanlon of Oxford Internet Institute, University of Oxford (on the EPSRC Being There project) Impact: An attacker may be able to determine Wi-Fi networks a device has previously accessedĭescription: Upon connecting to a Wi-Fi network, MAC addresses of previously accessed networks may have been broadcast. This issue was addressed through improved path sanitization. Impact: A malicious application may be able to create symlinks to protected regions of the diskĭescription: An issue existed within the path validation logic for symlinks. This was addressed with improved validation. Impact: AirTraffic may have allowed access to protected parts of the filesystemĭescription: A path traversal issue existed in asset handling. This issue was addressed by adding additional path checks.ĬVE-2015-5746 : evad3rs, TaiG Jailbreak Team Impact: A maliciously crafted afc command may allow access to protected parts of the filesystemĭescription: An issue existed in the symbolic linking mechanism of afc. Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
