About the security content of iOS 9.2
This document describes the security content of iOS 9.2.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other security updates, see Apple security updates.
iOS 9.2
- AppleMobileFileIntegrityAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may be able to execute arbitrary code with system privilegesDescription: An access control issue was addressed by preventing modification of access control structures.CVE-IDCVE-2015-7055 : Apple
- AppSandboxAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may maintain access to Contacts after having access revokedDescription: An issue existed in the sandbox's handling of hard links. This issue was addressed through improved hardening of the app sandbox.CVE-IDCVE-2015-7001 : Razvan Deaconescu and Mihai Bucicoiu of University POLITEHNICA of Bucharest; Luke Deshotels and William Enck of North Carolina State University; Lucas Vincenzo Davi and Ahmad-Reza Sadeghi of TU Darmstadt
- CFNetwork HTTPProtocolAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: An attacker with a privileged network position may be able to bypass HSTSDescription: An input validation issue existed within URL processing. This issue was addressed through improved URL validation.CVE-IDCVE-2015-7094 : Tsubasa Iinuma (@llamakko_cafe) of Gehirn Inc. and Muneaki Nishimura (nishimunea)
- CompressionAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to arbitrary code executionDescription: An uninitialized memory access issue existed in zlib. This issue was addressed through improved memory initialization and additional validation of zlib streams.CVE-IDCVE-2015-7054 : j00ru
- CoreGraphicsAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Processing a maliciously crafted font file may lead to arbitrary code executionDescription: A memory corruption issue existed in the processing of font files. This issue was addressed through improved input validation.CVE-IDCVE-2015-7105 : John Villamil (@day6reak), Yahoo Pentest Team
- CoreMedia PlaybackAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in the processing of malformed media files. These issues were addressed through improved memory handling.CVE-IDCVE-2015-7074 : AppleCVE-2015-7075
- dyldAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may be able to execute arbitrary code with system privilegesDescription: Multiple segment validation issues existed in dyld. These were addressed through improved environment sanitization.CVE-IDCVE-2015-7072 : AppleCVE-2015-7079 : PanguTeam
- GPUTools FrameworkAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may be able to execute arbitrary code with system privilegesDescription: Multiple path validation issues existed in Mobile Replayer. These were addressed through improved environment sanitization.CVE-IDCVE-2015-7069 : Luca Todesco (@qwertyoruiop)CVE-2015-7070 : Luca Todesco (@qwertyoruiop)
- iBooksAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Parsing a maliciously crafted iBooks file may lead to disclosure of user informationDescription: An XML external entity reference issue existed with iBook parsing. This issue was addressed through improved parsing.CVE-IDCVE-2015-7081 : Behrouz Sadeghipour (@Nahamsec) and Patrik Fehrenbach (@ITSecurityguard)
- ImageIOAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Processing a maliciously crafted image may lead to arbitrary code executionDescription: A memory corruption issue existed in ImageIO. This issue was addressed through improved memory handling.CVE-IDCVE-2015-7053 : Apple
- IOHIDFamilyAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may be able to execute arbitrary code with system privilegesDescription: Multiple memory corruption issues existed in IOHIDFamily API. These issues were addressed through improved memory handling.CVE-IDCVE-2015-7111 : beist and ABH of BoBCVE-2015-7112 : Ian Beer of Google Project Zero
- IOKit SCSIAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may be able to execute arbitrary code with kernel privilegesDescription: A null pointer dereference existed in the handling of a certain userclient type. This issue was addressed through improved validation.CVE-IDCVE-2015-7068 : Ian Beer of Google Project Zero
- KernelAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local application may be able to cause a denial of serviceDescription: Multiple denial of service issues were addressed through improved memory handling.CVE-IDCVE-2015-7040 : Lufeng Li of Qihoo 360 Vulcan TeamCVE-2015-7041 : Lufeng Li of Qihoo 360 Vulcan TeamCVE-2015-7042 : Lufeng Li of Qihoo 360 Vulcan TeamCVE-2015-7043 : Tarjei Mandt (@kernelpool)
- KernelAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local user may be able to execute arbitrary code with kernel privilegesDescription: Multiple memory corruption issues existed in the kernel. These issues were addressed through improved memory handling.CVE-IDCVE-2015-7083 : Ian Beer of Google Project ZeroCVE-2015-7084 : Ian Beer of Google Project Zero
- KernelAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A local user may be able to execute arbitrary code with kernel privilegesDescription: An issue existed in the parsing of mach messages. This issue was addressed through improved validation of mach messages.CVE-IDCVE-2015-7047 : Ian Beer of Google Project Zero
- LaunchServicesAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A memory corruption issue existed in the processing of malformed plists. This issue was addressed through improved memory handling.CVE-IDCVE-2015-7113 : Olivier Goguel of Free Tools Association
- libarchiveAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to arbitrary code executionDescription: A memory corruption issue existed in the processing of archives. This issue was addressed through improved memory handling.CVE-IDCVE-2011-2895 : @practicalswift
- libcAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Processing a maliciously crafted package may lead to arbitrary code executionDescription: Multiple buffer overflows existed in the C standard library. These issues were addressed through improved bounds checking.CVE-IDCVE-2015-7038CVE-2015-7039 : Maksymilian Arciemowicz (CXSECURITY.COM)
- libxml2Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Parsing a maliciously crafted XML document may lead to disclosure of user informationDescription: A memory corruption issue existed in the parsing of XML files. This issue was addressed through improved memory handling.CVE-IDCVE-2015-3807 : Wei Lei and Liu Yang of Nanyang Technological University
- MobileStorageMounterAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A timing issue existed in loading of the trust cache. This issue was resolved by validating the system environment before loading the trust cache.CVE-IDCVE-2015-7051 : PanguTeam
- OpenGLAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in OpenGL. These issues were addressed through improved memory handling.CVE-IDCVE-2015-7064 : AppleCVE-2015-7065 : AppleCVE-2015-7066 : Tongbo Luo and Bo Qu of Palo Alto Networks
- PhotosAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: An attacker may be able to use the backup system to access restricted areas of the file systemDescription: A path validation issue existed in Mobile Backup. This was addressed through improved environment sanitization.CVE-IDCVE-2015-7037 : PanguTeam
- QuickLookAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Opening a maliciously crafted iWork file may lead to arbitrary code executionDescription: A memory corruption issue existed in the handling of iWork files. This issue was addressed through improved memory handling.CVE-IDCVE-2015-7107
- SafariAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a malicious website may lead to user interface spoofingDescription: An issue may have allowed a website to display content with a URL from a different website. This issue was addressed through improved URL handling.CVE-IDCVE-2015-7093 : xisigr of Tencent's Xuanwu LAB (www.tencent.com)
- SandboxAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application with root privileges may be able to bypass kernel address space layout randomizationDescription: An insufficient privilege separation issue existed in xnu. This issue was addressed by improved authorization checks.CVE-IDCVE-2015-7046 : Apple
- SecurityAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A remote attacker may cause an unexpected application termination or arbitrary code executionDescription: A memory corruption issue existed in handling SSL handshakes. This issue was addressed through improved memory handling.CVE-IDCVE-2015-7073 : Benoit Foucher of ZeroC, Inc.
- SecurityAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A malicious application may gain access to a user's Keychain itemsDescription: An issue existed in the validation of access control lists for keychain items. This issue was addressed through improved access control list checks.CVE-IDCVE-2015-7058
- SiriAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: A person with physical access to an iOS device may be able to use Siri to read notifications of content that is set not to be displayed at the lock screenDescription: When a request was made to Siri, client side restrictions were not being checked by the server. This issue was addressed through improved restriction checking.CVE-IDCVE-2015-7080 : Or Safran (www.linkedin.com/profile/view?id=33912591)
- WebKitAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may lead to arbitrary code executionDescription: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling.CVE-IDCVE-2015-7048 : AppleCVE-2015-7095 : AppleCVE-2015-7096 : AppleCVE-2015-7097 : AppleCVE-2015-7098 : AppleCVE-2015-7099 : AppleCVE-2015-7100 : AppleCVE-2015-7101 : AppleCVE-2015-7102 : AppleCVE-2015-7103 : Apple
- WebKitAvailable for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and laterImpact: Visiting a maliciously crafted website may reveal a user's browsing historyDescription: An insufficient input validation issue existed in content blocking. This issue was addressed through improved content extension parsing.CVE-IDCVE-2015-7050 : Luke Li and Jonathan Metzman
Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Risks are inherent in the use of the Internet. Contact the vendor for additional information. Other company and product names may be trademarks of their respective owners.
Last Modified: