Vulnerability Description
JavaScriptCore in WebKit, as distributed in Safari Technology Preview Release 18, allows remote attackers to cause a denial of service (bitfield out-of-bounds read and application crash) via crafted JavaScript code that is mishandled in the operatorString function, related to assembler/MacroAssemblerARM64.h, assembler/MacroAssemblerX86Common.h, and wasm/WasmB3IRGenerator.cpp.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Safari | 18 |
Related Weaknesses (CWE)
References
- https://bugs.webkit.org/show_bug.cgi?id=165091Issue TrackingThird Party Advisory
- https://trac.webkit.org/changeset/209295Issue TrackingThird Party Advisory
- https://bugs.webkit.org/show_bug.cgi?id=165091Issue TrackingThird Party Advisory
- https://trac.webkit.org/changeset/209295Issue TrackingThird Party Advisory
FAQ
What is CVE-2016-10226?
CVE-2016-10226 is a vulnerability with a CVSS score of 7.5 (HIGH). JavaScriptCore in WebKit, as distributed in Safari Technology Preview Release 18, allows remote attackers to cause a denial of service (bitfield out-of-bounds read and application crash) via crafted J...
How severe is CVE-2016-10226?
CVE-2016-10226 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10226?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Safari.