ID

VAR-200909-0310


CVE

CVE-2009-2206


TITLE

Apple iPhone OS of CoreAudio Component buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-002118

DESCRIPTION

Multiple heap-based buffer overflows in the AudioCodecs library in the CoreAudio component in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted (1) AAC or (2) MP3 file, as demonstrated by a ringtone with malformed entries in the sample size table. Apple iPhone and iPod touch are prone to a heap-based buffer-overflow vulnerability. Successful exploits may allow an attacker to execute arbitrary code on a vulnerable device. Failed attacks will cause denial-of-service conditions. This issue was previously covered in BID 36326 (Apple iPhone prior to 3.1 and iPod touch Prior to3.1.1 Multiple Vulnerabilities) but has been given its own record to better document it. This issue affects the following: iPhone OS 1.0 through 3.0.1 iPhone OS for iPod touch 1.1 through 3.0. Apple iPhone is a smart phone of Apple (Apple). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Advisory: Apple iPhone OS AudioCodecs Heap Buffer Overflow Advisory ID: TKADV2009-007 Revision: 1.0 Release Date: 2009/09/09 Last Modified: 2009/09/09 Date Reported: 2009/04/05 Author: Tobias Klein (tk at trapkit.de) Affected Software: iPhone OS 1.0 through 3.0.1 iPhone OS for iPod touch 1.1 through 3.0 Remotely Exploitable: Yes Locally Exploitable: No Vendor URL: http://www.apple.com/ Vendor Status: Vendor has released an updated version CVE-ID: CVE-2009-2206 Patch development time: 158 days ====================== Vulnerability Details: ====================== The iPhone OS AudioCodecs library contains a heap buffer overflow vulnerability while parsing maliciously crafted AAC or MP3 files. One attack vector are iPhone ringtones with malformed sample size table entries. It was successfully tested that iTunes uploads such malformed ringtones to the phone. ================== Technical Details: ================== Vulnerable library: /System/Library/Frameworks/AudioToolbox.framework/AudioCodecs Vulnerable function: ACTransformerCodec::AppendInputData() Disassembly of the vulnerable function: [..] __text:3314443C LDR R3, [R5,#0xA8] __text:33144440 LDR R2, [R5,#0xA4] __text:33144444 ADD R3, R3, #1 __text:33144448 ADD R2, fp, R2 __text:3314444C STR R3, [R5,#0xA8] __text:33144450 MOV R3, #0 __text:33144454 STMIA IP, {R2,R3} [1] __text:33144458 MOV R3, #0 __text:3314445C STR R3, [IP,#8] [2] __text:33144460 LDR R3, [SP,#0x4C+sample_size] [3] __text:33144464 STR R3, [IP,#0xC] [4] __text:33144468 ADD IP, IP, #0x10 [5] [..] [1] The values of R2 and R3 are stored into the heap buffer pointed to by IP (R12). R2 contains user controlled data. [2] The value of R3 gets copied into the heap buffer. [3] R3 is filled with user controlled data from the audio file. [4] The user controlled data of R3 gets copied into the heap buffer. [5] The index into the heap buffer (pointed to by IP) gets incremented. This code snippet gets executed in a loop. As there is no bounds checking of the heap buffer pointed to by IP (R12) it is possible to cause an out of bounds write (heap buffer overflow). ==================== Disclosure Timeline: ==================== 2009/04/05 - Apple Product Security Team notified 2009/04/05 - Received an automated response message 2009/04/07 - Reply from Apple 2009/06/05 - Status update request sent to Apple 2009/06/05 - Apple confirms the vulnerability 2009/08/17 - Status update by Apple 2009/09/05 - Status update by Apple 2009/09/09 - New iPhone OS released by Apple 2009/09/09 - Release date of this security advisory ======== Credits: ======== Vulnerability found and advisory written by Tobias Klein. =========== References: =========== [REF1] http://support.apple.com/kb/HT3860 [REF2] http://www.trapkit.de/advisories/TKADV2009-007.txt ======== Changes: ======== Revision 0.1 - Initial draft release to the vendor Revision 1.0 - Public release =========== Disclaimer: =========== The information within this advisory may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are no warranties, implied or express, with regard to this information. In no event shall the author be liable for any direct or indirect damages whatsoever arising out of or in connection with the use or spread of this information. Any use of this information is at the user's own risk. ================== PGP Signature Key: ================== http://www.trapkit.de/advisories/tk-advisories-signature-key.asc Copyright 2009 Tobias Klein. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: PGP Charset: utf-8 wj8DBQFKqB4rkXxgcAIbhEERAik4AKD5gWG/GvB9bLQojJpaLhTVlfpj4gCfSJ9i nVSlzUd5NozllFGeI5rCboc= =B2cm -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Apple iPhone / iPod touch Multiple Vulnerabilities SECUNIA ADVISORY ID: SA36677 VERIFY ADVISORY: http://secunia.com/advisories/36677/ DESCRIPTION: Some vulnerabilities, security issues, and weaknesses have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people with physical access to the device to bypass certain security restrictions or disclose sensitive information, and by malicious people to disclose sensitive information, conduct cross-site scripting and spoofing attacks, cause a DoS (Denial of Service), or to compromise a user's system. 2) An error in Exchange Support exists due to the "Require Passcode" setting not being affected by the "Maximum inactivity time lock" setting. This may lead to a time window, regardless of the Maximum inactivity time lock" setting, in which a person with physical access to the device is able to use the Exchange services. 3) A security issue exists in MobileMail due to deleted mails being accessible via Spotlight search. This can be exploited by malicious people with physical access to the device to disclose potentially sensitive information. 4) An unspecified error exists in the Recovery Mode command parsing. This can be exploited by a person with physical access to a device to cause a heap-based buffer overflow and e.g. gain access to a locked device. 5) A NULL pointer dereference error within the handling of SMS arrival notifications can be exploited to cause a service interruption. 6) An error in the handling of passwords in UIKit can be exploited by a person with physical access to a device to disclose a password. 7) Safari includes the user name and password in the "Referer" header, which can lead to the exposure of sensitive information. 8) Two vulnerabilities in WebKit can be exploited by malicious people to conduct cross-site scripting attacks or potentially compromise a user's system. For more information: SA35758 9) A vulnerability in WebKit can be exploited by malicious people to conduct spoofing attacks. PROVIDED AND/OR DISCOVERED BY: 1) Tobias Klein, trapkit.de The vendor credits: 2) Allan Steven, Robert Duran, Jeff Beckham of PepsiCo, Joshua Levitsky, Michael Breton of Intel Corporation, Mike Karban of Edward Jones, and Steve Moriarty of Agilent Technologies 3) Clickwise Software and Tony Kavadias 5) Charlie Miller of Independent Security Evaluators and Collin Mulliner of Technical University Berlin 6) Abraham Vegh 7) James A. T. Rice of Jump Networks Ltd ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT3860 Tobias Klein: http://trapkit.de/advisories/TKADV2009-007.txt OTHER REFERENCES: SA35758: http://secunia.com/advisories/35758/ SA36269: http://secunia.com/advisories/36269/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2009-2206 // JVNDB: JVNDB-2009-002118 // BID: 36338 // VULHUB: VHN-39652 // PACKETSTORM: 81311 // PACKETSTORM: 81171

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:ipod touchscope:eqversion:*

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:3.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:*

Trust: 1.0

vendor:applemodel:iosscope:eqversion:1.0 to 3.0.1

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:1.1 to 3.0

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:3.1.1

Trust: 0.3

vendor:applemodel:iphonescope:neversion:3.1

Trust: 0.3

sources: BID: 36338 // JVNDB: JVNDB-2009-002118 // CNNVD: CNNVD-200909-178 // NVD: CVE-2009-2206

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2206
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-2206
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200909-178
value: MEDIUM

Trust: 0.6

VULHUB: VHN-39652
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-2206
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2009-2206
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-39652
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-39652 // JVNDB: JVNDB-2009-002118 // CNNVD: CNNVD-200909-178 // NVD: CVE-2009-2206

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-39652 // JVNDB: JVNDB-2009-002118 // NVD: CVE-2009-2206

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200909-178

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-200909-178

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002118

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-39652

PATCH

title:HT3860url:http://support.apple.com/kb/HT3860

Trust: 0.8

title:HT3860url:http://support.apple.com/kb/HT3860?viewlocale=ja_JP

Trust: 0.8

title:Apple iPhone OS Repair measures for heap buffer error vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=203137

Trust: 0.6

sources: JVNDB: JVNDB-2009-002118 // CNNVD: CNNVD-200909-178

EXTERNAL IDS

db:NVDid:CVE-2009-2206

Trust: 2.9

db:SECUNIAid:36677

Trust: 2.6

db:BIDid:36338

Trust: 2.0

db:SECTRACKid:1022869

Trust: 1.7

db:JVNDBid:JVNDB-2009-002118

Trust: 0.8

db:CNNVDid:CNNVD-200909-178

Trust: 0.7

db:PACKETSTORMid:81311

Trust: 0.2

db:VULHUBid:VHN-39652

Trust: 0.1

db:PACKETSTORMid:81171

Trust: 0.1

sources: VULHUB: VHN-39652 // BID: 36338 // JVNDB: JVNDB-2009-002118 // PACKETSTORM: 81311 // PACKETSTORM: 81171 // CNNVD: CNNVD-200909-178 // NVD: CVE-2009-2206

REFERENCES

url:http://secunia.com/advisories/36677

Trust: 2.5

url:http://www.trapkit.de/advisories/tkadv2009-007.txt

Trust: 2.1

url:http://support.apple.com/kb/ht3860

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2009/sep/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/36338

Trust: 1.7

url:http://www.securityfocus.com/archive/1/506464/100/0/threaded

Trust: 1.7

url:http://www.securitytracker.com/id?1022869

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/53180

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2206

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2206

Trust: 0.8

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:msg://bugtraq/4aae8a92.1070406@trapkit.de

Trust: 0.3

url:http://www.apple.com/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2009-2206

Trust: 0.1

url:http://www.trapkit.de/advisories/tk-advisories-signature-key.asc

Trust: 0.1

url:http://trapkit.de/advisories/tkadv2009-007.txt

Trust: 0.1

url:http://secunia.com/advisories/36677/

Trust: 0.1

url:http://secunia.com/advisories/35758/

Trust: 0.1

url:http://secunia.com/advisories/36269/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-39652 // BID: 36338 // JVNDB: JVNDB-2009-002118 // PACKETSTORM: 81311 // PACKETSTORM: 81171 // CNNVD: CNNVD-200909-178 // NVD: CVE-2009-2206

CREDITS

Allan Steven Robert Duran

Trust: 0.6

sources: CNNVD: CNNVD-200909-178

SOURCES

db:VULHUBid:VHN-39652
db:BIDid:36338
db:JVNDBid:JVNDB-2009-002118
db:PACKETSTORMid:81311
db:PACKETSTORMid:81171
db:CNNVDid:CNNVD-200909-178
db:NVDid:CVE-2009-2206

LAST UPDATE DATE

2024-11-23T19:43:27.798000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39652date:2018-10-10T00:00:00
db:BIDid:36338date:2009-09-14T20:31:00
db:JVNDBid:JVNDB-2009-002118date:2009-10-21T00:00:00
db:CNNVDid:CNNVD-200909-178date:2022-08-10T00:00:00
db:NVDid:CVE-2009-2206date:2024-11-21T01:04:23.147

SOURCES RELEASE DATE

db:VULHUBid:VHN-39652date:2009-09-10T00:00:00
db:BIDid:36338date:2009-09-09T00:00:00
db:JVNDBid:JVNDB-2009-002118date:2009-10-21T00:00:00
db:PACKETSTORMid:81311date:2009-09-15T04:39:51
db:PACKETSTORMid:81171date:2009-09-10T15:09:40
db:CNNVDid:CNNVD-200909-178date:2009-09-10T00:00:00
db:NVDid:CVE-2009-2206date:2009-09-10T21:30:01.093