Multiple Vulnerabilities in Apple Products Could Allow Remote Code Execution

ITS Advisory Number: 
2015-118
Date(s) Issued: 
Thursday, October 1, 2015
Subject: 
Multiple Vulnerabilities in Apple Products Could Allow Remote Code Execution
Overview: 

Multiple vulnerabilities have been discovered in Apple Safari, Apple OS X and Apple iOS that could lead to remote code execution. Apple Safari is a web browser usable by many modern operating systems. Apple OS X is an operating system designed to run on Apple Mac Computers. Apple iOS is an operating system for iPhone, iPod touch, and iPad. These vulnerabilities can be exploited if a user visits or is redirected to a specially crafted webpage or opens a specially crafted file, including an email attachment.

Successful exploitation could result in an attacker gaining the same privileges as the logged on user, remote code execution within the context of the application, and the ability to bypass the security system. Failed attacks may still cause a Denial of Service condition within the targeted delivery method. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Systems Affected: 
  • Apple iOS prior to 9.0.2
  • Apple OS X prior to 10.11
  • Apple Safari prior to 9
RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

Multiple vulnerabilities have been discovered in Apple Safari, Apple OS X and Apple iOS that could lead to remote code execution. Details of these vulnerabilities are as follows:

  • Multiple vulnerabilities affect the 'Kernel' component, which could allow an attacker to execute arbitrary code. (CVE-2015-5868, CVE-2015-5896, CVE-2015-5903)
  • Multiple vulnerabilities in PHP versions prior to 5.5.27 could lead to remote code execution (CVE-2014-9425, CVE-2014-9427, CVE-2014-9652, CVE-2014-9705, CVE-2014-9709, CVE-2015-0231, CVE-2015-0232, CVE-2015-0235, CVE-2015-0273, CVE-2015-1351, CVE-2015-1352, CVE-2015-2301, CVE-2015-2305, CVE-2015-2331, CVE-2015-2348, CVE-2015-2783, CVE-2015-2787, CVE-2015-3329, CVE-2015-3330)
  • A memory-corruption vulnerability affects the 'CoreText' component when handling specially-crafted font files. An attacker can exploit this issue to execute arbitrary code. (CVE-2015-5874)
  • A memory-corruption vulnerability affects the 'Dev Tools' component. An attacker can exploit this issue to execute arbitrary code. (CVE-2015-5876)
  • A memory-corruption vulnerability affects the 'Disk Images' component. An attacker can exploit this issue to execute arbitrary code. (CVE-2015-5847)
  • A memory-corruption vulnerability affects the 'libc' component. An attacker can exploit this issue to execute arbitrary code. (CVE-2014-8611)
  • A memory-corruption vulnerability affects the 'libpthread' component. An attacker can exploit this issue to execute arbitrary code. (CVE-2015-5899)
  • A memory-corruption vulnerability affects the 'IOHIDFamily' component. An attacker can exploit this issue to execute arbitrary code. (CVE-2015-5867)
  • Memory-corruption vulnerabilities affect the 'JavaScriptCore' component. An attacker can exploit these issues to execute arbitrary code. (CVE-2015-5791, CVE-2015-5793, CVE-2015-5814, CVE-2015-5816, CVE-2015-5822, CVE-2015-5823)
  • Memory-corruption vulnerabilities affect the 'tidy' component. An attacker can exploit these issues to execute arbitrary code. (CVE-2015-5522, CVE-2015-5523)
  • Webkit is prone multiple memory-corruption vulnerabilities, which could allow for arbitrary code execution. (CVE-2015-5789, CVE-2015-5790, CVE-2015-5792, CVE-2015-5794, CVE-2015-5795, CVE-2015-5796, CVE-2015-5797, CVE-2015-5799, CVE-2015-5800, CVE-2015-5801, CVE-2015-5802, CVE-2015-5803, CVE-2015-5804, CVE-2015-5805, CVE-2015-5806, CVE-2015-5807, CVE-2015-5809, CVE-2015-5810, CVE-2015-5811, CVE-2015-5812, CVE-2015-5813, CVE-2015-5817, CVE-2015-5818, CVE-2015-5819, CVE-2015-5821, CVE-2015-5798, CVE-2015-5808, CVE-2015-5815)
  • Malicious audio playback may cause unexpected app termination. (CVE-2015-5862)
  • User-activity can be tracked by attacker in privileged network position. (CVE-2015-5885)
  • Unintended cookie creation for websites. (CVE-2015-3801)
  • Client reconnaissance of other hosts using malicious ftp servers. (CVE-2015-5912)
  • Bypass of HTTP Strict Transport Security (HSTS) with a maliciously crafted URL to leak sensitive data. (CVE-2015-5858)
  • User-tracking safari private browsing mode with a malicious website. (CVE-2015-5860)
  • Assigning malicious cookies for a website by malicious websites. (CVE-2015-5841)
  • Interception of SSL/TLS connections by attacker from privileged network position. (CVE-2015-5824)
  • Bypass of dyld code signing. (CVE-2015-5839)
  • Access of player's email address by malicious Game Center application. (CVE-2015-5855)
  • Memory reading by local attacker. (CVE-2015-5863)
  • Stack cookie values controlled by attacker. (CVE-2013-3951)
  • Modification of other processes by a local process without entitlement checks. (CVE-2015-5882)
  • Ability to launch DoS attacks to TCP connections without sequence number. (CVE-2015-5879)
  • Disabling of IPv6 routing by attacker in local LAN segment. (CVE-2015-5869)
  • Determination of kernel memory layout by local user. (CVE-2015-5842)
  • Observation of unprotected multipeer data by local attacker. (CVE-2015-5851)
  • Determination of kernel memory layout by malicious application. (CVE-2015-5831)
  • OpenSSL vulnerabilities. (CVE-2015-0286, CVE-2015-0287)
  • Unexpected application termination by malicious data processing. (CVE-2015-5840)
  • Access to Safari bookmarks on locked iOS device without use of passcode. (CVE-2015-5903)
  • User-interface spoofing from malicious website. (CVE-2015-5764, CVE-2015-5765, CVE-2015-5767)
  • User-tracking with client certificates by malicious websites. (CVE-2015-1129)
  • Object references leak in WebKit. (CVE-2015-5827)
  • Unintended dialing by visiting malicious website. (CVE-2015-5820)
  • Cross-origin data exfiltration vulnerability. (CVE-2015-5826)
  • Leakage of browsing history, mouse movements, and network activity by malicious website. (CVE-2015-5825)
  • Disclosure of image data from another site when visiting malicious website. (CVE-2015-5788)
  • Arbitrary code execution when opening a media file. (CVE-2010-3190)
  • The local communication between Safari extensions and companion apps could be compromise by another native app. A validated extension could be replaced on disk without prompting the user (CVE-2015-5780)
  • The Safari plugins may send an HTTP request without knowing the request was redirected which could lead to unauthorized requests(CVE-2015-5828)
  • A local arbitrary code injection vulnerability exists in Address Book Framework's handling of environmental variable (CVE-2015-5897)
  • An information leakage vulnerability exists in the way Air Scan processed eSCL packets (CVE-2015-5853)
  • An information disclosure vulnerability exists with access control lists used for iCloud keychain item (CVE-2015-5836)
  • An issue existed that allowed some users to send events to other users (CVE-2015-5849)
  • Multiple vulnerabilities in Bash exists because of improper parsing of function definitions in the values of environmental variables which could allow for arbitrary code execution (CVE-2014-6277, CVE-2014-7186, CVE-2014-7187)
  • An attacker could prevent the system from booting by using a malicious application with addresses that existed in the protected range register (CVE-2015-5900)
  • A malicious Apple Ethernet Thunderbolt adapter could allow an attacker to perform firmware flashing (CVE-2015-5914)
  • The "Secure empty trashcan" feature might not securely delete files which could lead to information disclosure (CVE-2015-5901)
  • A malicious attacker may be able to play Kerberos credentials to the SMB server (CVE-2015-5913)
  • Multiple vulnerabilities in ICU could lead to arbitrary code via especially crafted text (CVE-2014-8146, CVE-2014-8147, CVE-2015-5922)
  • A local privilege escalation vulnerability exists in the Install private framework (CVE-2015-5888)
  • A local user may execute arbitrary code with system privilege by leveraging the Intel Graphics Driver (CVE-2015-5830, CVE-2015-5877)
  • A local attacker may be able to determine the kernel memory layout due to an issue that exists in the IOAudioFamily (CVE-2015-5864)
  • A local attacker may be able to execute arbitrary code with kernel privilege due to multiple vulnerabilities that exist in IOGraphics (CVE-2015-5871, CVE-2015-5872, CVE-2015-5873, CVE-2015-5890)
  • Multiple memory corruption vulnerabilities exists in IOHIDFamily which could lead to a malicious application executing arbitrary code with system privilege (CVE-2015-5866, CVE-2015-5867)
  • A local user may be able to determine kernel memory layout due an issue that exists in the debugging interfaces (CVE-2015-5870)
  • A local user maybe able to cause a denial of service to the system due to issues that exist in debugging functionality (CVE-2015-5902)
  • Due to a vulnerability that exist in Launchpad a large amount of SSH connections could cause denial of service (CVE-2015-5881)
  • An issue existed with the screen lock not engaging after the specified time period (CVE-2015-5833)
  • A remote denial of service vulnerability exists in the glob-processing of tnftpd (CVE-2015-5917)
  • An attacker in a privileged network position may be able to intercept attachments of s/MIME-encrypted e-mail sent via Mail Drop (CVE-2015-5884)
  • A local attacker may be able to access sensitive user information due to a vulnerability that exists when parsing links in the Notes application (CVE-2015-5878)
  • A cross site scripting vulnerability in parsing text in the Notes application can lead to information disclosure (CVE-2015-5875)
  • Multiple vulnerabilities in OpenSSh were fixed by upgrading the version of OpenSSh used (CVE-2014-2532)
  • Multiple vulnerabilities exist in procmail which were fixed by upgrading the version of procmail used (CVE-2014-3618)
  • A local user may be able to execute arbitrary code with root privilege due to a vulnerability that exists in the rsh binary (CVE-2015-5889)
  • Multiple vulnerabilities that existed with Ruby was fixed by updating the version of Ruby used (CVE-2014-8080, CVE-2014-8090, CVE-2015-1855)
  • A state management vulnerability existed in the way keychain lock status was tracked, which could incorrectly display the status of the keychain (CVE-2015-5915)
  • A vulnerability with the kSecRevocationRequirePositiveResponse flag could allow a trust evaluation configured to require revocation checking may succeed even if revocation fails (CVE-2015-5894)
  • A remote server may prompt for a certificate before identifying itself which could allow information disclosure (CVE-2015-5887)
  • A local arbitrary code execution vulnerability exists due to memory corruption issues in the kernel (CVE-2015-5891)
  • A local information disclosure vulnerability exists in the SMBClient (CVE-2015-5893)
  • Multiple vulnerabilities in SQLite were fixed by updating the version of SQLite used (CVE-2015-3414, CVE-2015-3415, CVE-2015-3416)
  • A local attacker can place phone calls without knowledge of the user when using continuity (CVE-2015-3785)
  • A maliciously crafted text could mislead users in Terminal due to errors in the way Terminal handled bidirectional override characters (CVE-2015-5883)
  • A person with physical access to an iOS device may be able to access photos and contacts from the lock screen leading to information disclosure (CVE-2015-5923)

Successful exploitation could result in an attacker gaining the same privileges as the logged on user, remote code execution within the context of the application, and the ability to bypass the security systems. Failed attacks may still cause a Denial of Service condition within the targeted delivery method. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Actions: 
  • Apply appropriate updates provided by Apple to vulnerable systems immediately after appropriate testing.
  • Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.
  • Remind users not to download, accept, or execute files from un-trusted or unknown sources.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.

 

References: 

Apple:

https://support.apple.com/en-us/HT205267

https://support.apple.com/en-us/HT205284

https://support.apple.com/en-us/HT205265

SecurityFocus:

http://www.securityfocus.com/advisories/36285

http://www.securityfocus.com/advisories/36284

CVE:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3951

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8611

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1129

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1351

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1352

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1855

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2348

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2532

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2787

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3414

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3415

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3416

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3618

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3785

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3801

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5522

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5523

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5764

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5765

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5767

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5780

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5788

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5789

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5790

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5791

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5792

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5793

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5794

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5795

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5796 

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5797

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5798

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5799

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5800

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5801

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5802

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5803

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5804

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5805

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5806

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5807

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5808

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5809

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5810

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5811

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5812

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5813

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5814

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5815

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5816

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5817

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5818

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5819

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5820

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5821

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5822

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5823

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5824

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5825

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5826

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5827

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5828

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5830

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5831

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5833

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5836

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5839

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5840

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5841

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5842

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5844

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5847

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5849

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5851

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5855

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5858

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5860

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5862

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5863

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5864

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5866

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5867

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5867

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5868

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5869

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5870

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5871

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5872

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5873

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5874

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5875

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5876

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5877

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5878

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5879

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5881

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5882

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5883

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5884

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5885

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5887

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5888

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5889

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5890

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5891

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5893

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5894

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5896

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5897

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5899

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5900

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5901

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5902

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5903

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5912

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5913

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5914

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5915

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5917

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5922

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5923

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6277

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7186

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7187

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8080

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8090

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8146

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8147

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9425

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9427

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9652

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9705

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9709