ID

VAR-200906-0086


CVE

CVE-2009-1683


TITLE

iPhone OS denial of service (DoS) vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-000040

DESCRIPTION

The Telephony component in Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to cause a denial of service (device reset) via a crafted ICMP echo request, which triggers an assertion error related to a "logic issue.". iPhone OS from Apple contains a denial of service (DoS) vulnerability. Masaki Yoshida reported this vulnerability to IPA. JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.A remote attacker could possibly cause a denial of service (DoS) attack by sending a specially crafted packet. Apple iPhone and iPod touch are prone to multiple vulnerabilities. Successfully exploiting these issues may allow attackers to bypass security restrictions, obtain sensitive information, or cause denial-of-service conditions. These issues affect the following: iPhone OS 1.0 through 2.2.1 iPhone OS for iPod touch 1.1 through 2.2.1 This BID is being retired. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. 1) Multiple vulnerabilities in CoreGraphics can be exploited by malicious people to compromise a user's system. For more information: SA32706 SA34291 SA34723 SA35074 2) An error in the handling of untrusted Exchange server certificates can lead to the disclosure of credentials or application data due to the certificate being accepted with no prompt and validation. 3) A vulnerability in ImageIO can be exploited by malicious people to compromise a user's system. For more information: SA31558 SA32130 SA32773 7) An error in Mail can result in a phone call being initiated without user interaction if an application causes an alert during the call approval dialog. This is related to vulnerability #11 in: SA32756 8) An input validation error in the handling of MPEG-4 video files can lead to an unexpected device reset. 9) Clearing Safari's history via the Settings application can lead to disclosure of the search history. 11) Some vulnerabilities in WebKit can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, or to compromise a user's system. For more information: SA31326 SA35056 SA35379 12) An error in the separation of JavaScript contexts can be exploited to overwrite the "document.implementation" of an embedded or parent document served from a different security zone. 13) A type conversion error exists in the JavaScript exception handling in WebKit. This can be exploited to corrupt memory when assigning the exception to a variable that is declared as a constant and may allow execution of arbitrary code when a user visits a specially crafted web site. 14) An error in the JavaScript garbage collector implementation can potentially be exploited to corrupt memory and execute arbitrary code. 15) Multiple unspecified errors in the handling of javascript objects can potentially be exploited to conduct cross-site scripting attacks. 16) An error in WebKit can be exploited to alter standard JavaScript prototypes of websites served from a different domain. 17) An error in WebKit in the handling of HTMLSelectElement objects can be exploited to cause a device reset. 18) An error in WebKit can be exploited to load and capture an image from another website by using a canvas and a redirect. 19) An error in WebKit allows frames to be accessed by an HTML document after a page transition, which can be exploited to conduct cross-site scripting attacks. 20) An error in the handling of XMLHttpRequest headers in WebKit can be exploited to bypass the same-origin policy. 21) A Use-After-Free error exists in WebKit within the handling of the JavaScript DOM, which can potentially be exploited to execute arbitrary code. 22) An error in WebKit within the handling of Location and History objects can be exploited to conduct cross-site scripting attacks. PROVIDED AND/OR DISCOVERED BY: 7) Collin Mulliner of Fraunhofer SIT 10) Masaki Yoshida The vendor credits: 1) * Alin Rad Pop, Secunia Research * Will Dormann, CERT/CC * Barry K. Nathan * Tavis Ormandy, Google Security Team 2) FD of Securus Global 3) Tavis Ormandy, Google Security Team 4) Chris Weber, Casaba Security 8) Si Brindley 9) Joshua Belsky 11) * Thomas Raffetseder International Secure Systems Lab * Nils working with the ZDI * Michal Zalewski, Google Inc * SkyLined, Google Inc * Thierry Zoller working with the ZDI and Robert Swiecki of the Google Security Team * Chris Evans of Google Inc 12) Dean McNamee, Google Inc 13) Jesse Ruderman, Mozilla Corporation 14) SkyLined of Google Inc 15) Adam Barth of UC Berkeley and Collin Jackson of Stanford University 17) Thierry Zoller, G-SEC 18) Chris Evans 19) Feng Qian, Google Inc 20) Per von Zweigbergk 21) wushi & ling of team509 working with the ZDI 22) Adam Barth and Joel Weinberger of UC Berkeley CHANGELOG: 2009-06-18: Corrected credits section. Updated vulnerability #7 in "Description" section. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT3639 JVN: http://jvn.jp/en/jp/JVN87239696/index.html OTHER REFERENCES: SA31326: http://secunia.com/advisories/31326/ SA31478: http://secunia.com/advisories/31478/ SA31450: http://secunia.com/advisories/31450/ SA31558: http://secunia.com/advisories/31558/ SA32130: http://secunia.com/advisories/32130/ SA32706: http://secunia.com/advisories/32706/ SA32773: http://secunia.com/advisories/32773/ SA33970: http://secunia.com/advisories/33970/ SA34291: http://secunia.com/advisories/34291/ SA34723: http://secunia.com/advisories/34723/ SA35056: http://secunia.com/advisories/35056/ SA35074: http://secunia.com/advisories/35074/ SA35379: http://secunia.com/advisories/35379/ SA35436: http://secunia.com/advisories/35436/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.34

sources: NVD: CVE-2009-1683 // JVNDB: JVNDB-2009-000040 // BID: 35414 // BID: 35445 // VULHUB: VHN-39129 // PACKETSTORM: 78519

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.0

vendor:applemodel:ipod touchscope:eqversion:*

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:*

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:iosscope:eqversion:1.0 to 2.2.1

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:1.1 to 2.2.1

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.6

vendor:applemodel:ipod touchscope:neversion:3.0

Trust: 0.6

vendor:applemodel:iphonescope:neversion:3.0

Trust: 0.6

sources: BID: 35414 // BID: 35445 // JVNDB: JVNDB-2009-000040 // CNNVD: CNNVD-200906-316 // NVD: CVE-2009-1683

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-1683
value: HIGH

Trust: 1.0

IPA: JVNDB-2009-000040
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200906-316
value: MEDIUM

Trust: 0.6

VULHUB: VHN-39129
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-1683
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

IPA: JVNDB-2009-000040
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-39129
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-39129 // JVNDB: JVNDB-2009-000040 // CNNVD: CNNVD-200906-316 // NVD: CVE-2009-1683

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-20

Trust: 0.8

sources: JVNDB: JVNDB-2009-000040 // NVD: CVE-2009-1683

THREAT TYPE

network

Trust: 0.6

sources: BID: 35414 // BID: 35445

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200906-316

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-000040

PATCH

title:HT3639url:http://support.apple.com/kb/HT3639

Trust: 0.8

title:Apple iPhone Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=203139

Trust: 0.6

sources: JVNDB: JVNDB-2009-000040 // CNNVD: CNNVD-200906-316

EXTERNAL IDS

db:NVDid:CVE-2009-1683

Trust: 2.8

db:JVNid:JVN87239696

Trust: 2.6

db:JVNDBid:JVNDB-2009-000040

Trust: 2.5

db:BIDid:35414

Trust: 2.0

db:VUPENid:ADV-2009-1621

Trust: 1.7

db:CNNVDid:CNNVD-200906-316

Trust: 0.6

db:BIDid:35445

Trust: 0.4

db:SECUNIAid:35449

Trust: 0.2

db:VULHUBid:VHN-39129

Trust: 0.1

db:PACKETSTORMid:78519

Trust: 0.1

sources: VULHUB: VHN-39129 // BID: 35414 // BID: 35445 // JVNDB: JVNDB-2009-000040 // PACKETSTORM: 78519 // CNNVD: CNNVD-200906-316 // NVD: CVE-2009-1683

REFERENCES

url:http://jvn.jp/en/jp/jvn87239696/index.html

Trust: 2.6

url:http://support.apple.com/kb/ht3639

Trust: 2.4

url:http://lists.apple.com/archives/security-announce/2009/jun/msg00005.html

Trust: 1.7

url:http://www.securityfocus.com/bid/35414

Trust: 1.7

url:http://jvndb.jvn.jp/ja/contents/2009/jvndb-2009-000040.html

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1621

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1683

Trust: 0.8

url:http://www.ipa.go.jp/security/english/vuln/200906_iphone_en.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1683

Trust: 0.8

url:http://www.apple.com/iphone/

Trust: 0.6

url:http://www.apple.com/ipodtouch/

Trust: 0.6

url:http://secunia.com/advisories/34291/

Trust: 0.1

url:http://secunia.com/advisories/33970/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/32773/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/34723/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/35074/

Trust: 0.1

url:http://secunia.com/advisories/32706/

Trust: 0.1

url:http://secunia.com/advisories/31450/

Trust: 0.1

url:http://secunia.com/advisories/35379/

Trust: 0.1

url:http://secunia.com/advisories/31558/

Trust: 0.1

url:http://secunia.com/advisories/35056/

Trust: 0.1

url:http://secunia.com/advisories/35449/

Trust: 0.1

url:http://secunia.com/advisories/35436/

Trust: 0.1

url:http://secunia.com/advisories/31326/

Trust: 0.1

url:http://secunia.com/advisories/32130/

Trust: 0.1

url:http://secunia.com/advisories/31478/

Trust: 0.1

sources: VULHUB: VHN-39129 // BID: 35414 // BID: 35445 // JVNDB: JVNDB-2009-000040 // PACKETSTORM: 78519 // CNNVD: CNNVD-200906-316 // NVD: CVE-2009-1683

CREDITS

Oskar Lissheim-BoethiusOliver QuasChristian Schmitz

Trust: 0.6

sources: CNNVD: CNNVD-200906-316

SOURCES

db:VULHUBid:VHN-39129
db:BIDid:35414
db:BIDid:35445
db:JVNDBid:JVNDB-2009-000040
db:PACKETSTORMid:78519
db:CNNVDid:CNNVD-200906-316
db:NVDid:CVE-2009-1683

LAST UPDATE DATE

2024-11-23T20:29:49.119000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39129date:2012-03-30T00:00:00
db:BIDid:35414date:2009-06-19T23:09:00
db:BIDid:35445date:2009-06-19T21:29:00
db:JVNDBid:JVNDB-2009-000040date:2009-06-18T00:00:00
db:CNNVDid:CNNVD-200906-316date:2022-08-10T00:00:00
db:NVDid:CVE-2009-1683date:2024-11-21T01:03:04.570

SOURCES RELEASE DATE

db:VULHUBid:VHN-39129date:2009-06-19T00:00:00
db:BIDid:35414date:2009-06-17T00:00:00
db:BIDid:35445date:2009-06-17T00:00:00
db:JVNDBid:JVNDB-2009-000040date:2009-06-18T00:00:00
db:PACKETSTORMid:78519date:2009-06-18T07:29:46
db:CNNVDid:CNNVD-200906-316date:2009-06-19T00:00:00
db:NVDid:CVE-2009-1683date:2009-06-19T16:30:00.360