ID

VAR-200909-0364


CVE

CVE-2009-2795


TITLE

Apple iPhone OS Recovery mode component buffer overflow vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2009-002121

DESCRIPTION

Heap-based buffer overflow in the Recovery Mode component in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, allows local users to bypass the passcode requirement and access arbitrary data via vectors related to "command parsing.". Apple iPhone and iPod touch are prone to a heap-based buffer-overflow vulnerability. An attacker can exploit this issue to bypass the required passcode and gain access to sensitive information. This issue affects the following products: iPhone OS 1.0 through 3.0.1 iPhone OS for iPod touch 1.1 through 3.0 This issue was previously covered in BID 36326 (Apple iPhone prior to 3.1 and iPod touch Prior to 3.1.1 Multiple Vulnerabilities) but has been given its own record to better document it. Disclosing sensitive information or completely hacking a user's system. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Apple iPhone / iPod touch Multiple Vulnerabilities SECUNIA ADVISORY ID: SA36677 VERIFY ADVISORY: http://secunia.com/advisories/36677/ DESCRIPTION: Some vulnerabilities, security issues, and weaknesses have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people with physical access to the device to bypass certain security restrictions or disclose sensitive information, and by malicious people to disclose sensitive information, conduct cross-site scripting and spoofing attacks, cause a DoS (Denial of Service), or to compromise a user's system. 1) An error in CoreAudio when processing sample size table entries of AAC and MP3 files can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code. 2) An error in Exchange Support exists due to the "Require Passcode" setting not being affected by the "Maximum inactivity time lock" setting. This may lead to a time window, regardless of the Maximum inactivity time lock" setting, in which a person with physical access to the device is able to use the Exchange services. 3) A security issue exists in MobileMail due to deleted mails being accessible via Spotlight search. 4) An unspecified error exists in the Recovery Mode command parsing. This can be exploited by a person with physical access to a device to cause a heap-based buffer overflow and e.g. gain access to a locked device. 5) A NULL pointer dereference error within the handling of SMS arrival notifications can be exploited to cause a service interruption. 6) An error in the handling of passwords in UIKit can be exploited by a person with physical access to a device to disclose a password. 7) Safari includes the user name and password in the "Referer" header, which can lead to the exposure of sensitive information. 8) Two vulnerabilities in WebKit can be exploited by malicious people to conduct cross-site scripting attacks or potentially compromise a user's system. For more information: SA35758 9) A vulnerability in WebKit can be exploited by malicious people to conduct spoofing attacks. PROVIDED AND/OR DISCOVERED BY: 1) Tobias Klein, trapkit.de The vendor credits: 2) Allan Steven, Robert Duran, Jeff Beckham of PepsiCo, Joshua Levitsky, Michael Breton of Intel Corporation, Mike Karban of Edward Jones, and Steve Moriarty of Agilent Technologies 3) Clickwise Software and Tony Kavadias 5) Charlie Miller of Independent Security Evaluators and Collin Mulliner of Technical University Berlin 6) Abraham Vegh 7) James A. T. Rice of Jump Networks Ltd ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT3860 Tobias Klein: http://trapkit.de/advisories/TKADV2009-007.txt OTHER REFERENCES: SA35758: http://secunia.com/advisories/35758/ SA36269: http://secunia.com/advisories/36269/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-2795 // JVNDB: JVNDB-2009-002121 // BID: 36341 // VULHUB: VHN-40241 // PACKETSTORM: 81171

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:ltversion:3.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:3.1

Trust: 1.0

vendor:applemodel:iosscope:eqversion:1.0 to 3.0.1

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:1.1 to 3.0

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:3.1.1

Trust: 0.3

vendor:applemodel:iphonescope:neversion:3.1

Trust: 0.3

sources: BID: 36341 // JVNDB: JVNDB-2009-002121 // CNNVD: CNNVD-200909-181 // NVD: CVE-2009-2795

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2795
value: HIGH

Trust: 1.0

NVD: CVE-2009-2795
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200909-181
value: HIGH

Trust: 0.6

VULHUB: VHN-40241
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-2795
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-40241
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-40241 // JVNDB: JVNDB-2009-002121 // CNNVD: CNNVD-200909-181 // NVD: CVE-2009-2795

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-40241 // JVNDB: JVNDB-2009-002121 // NVD: CVE-2009-2795

THREAT TYPE

local

Trust: 0.9

sources: BID: 36341 // CNNVD: CNNVD-200909-181

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-200909-181

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002121

PATCH

title:HT3860url:http://support.apple.com/kb/HT3860

Trust: 0.8

title:HT3860url:http://support.apple.com/kb/HT3860?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2009-002121

EXTERNAL IDS

db:NVDid:CVE-2009-2795

Trust: 2.8

db:SECUNIAid:36677

Trust: 2.6

db:BIDid:36341

Trust: 1.4

db:JVNDBid:JVNDB-2009-002121

Trust: 0.8

db:CNNVDid:CNNVD-200909-181

Trust: 0.7

db:APPLEid:APPLE-SA-2009-09-09-1

Trust: 0.6

db:VULHUBid:VHN-40241

Trust: 0.1

db:PACKETSTORMid:81171

Trust: 0.1

sources: VULHUB: VHN-40241 // BID: 36341 // JVNDB: JVNDB-2009-002121 // PACKETSTORM: 81171 // CNNVD: CNNVD-200909-181 // NVD: CVE-2009-2795

REFERENCES

url:http://secunia.com/advisories/36677

Trust: 2.5

url:http://support.apple.com/kb/ht3860

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2009/sep/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/36341

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/53183

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2795

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2795

Trust: 0.8

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:http://trapkit.de/advisories/tkadv2009-007.txt

Trust: 0.1

url:http://secunia.com/advisories/36677/

Trust: 0.1

url:http://secunia.com/advisories/35758/

Trust: 0.1

url:http://secunia.com/advisories/36269/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-40241 // BID: 36341 // JVNDB: JVNDB-2009-002121 // PACKETSTORM: 81171 // CNNVD: CNNVD-200909-181 // NVD: CVE-2009-2795

CREDITS

Allan StevenRobert Duran

Trust: 0.6

sources: CNNVD: CNNVD-200909-181

SOURCES

db:VULHUBid:VHN-40241
db:BIDid:36341
db:JVNDBid:JVNDB-2009-002121
db:PACKETSTORMid:81171
db:CNNVDid:CNNVD-200909-181
db:NVDid:CVE-2009-2795

LAST UPDATE DATE

2024-11-23T20:11:05.779000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-40241date:2018-11-16T00:00:00
db:BIDid:36341date:2009-09-10T16:31:00
db:JVNDBid:JVNDB-2009-002121date:2009-10-21T00:00:00
db:CNNVDid:CNNVD-200909-181date:2009-09-24T00:00:00
db:NVDid:CVE-2009-2795date:2024-11-21T01:05:45.190

SOURCES RELEASE DATE

db:VULHUBid:VHN-40241date:2009-09-10T00:00:00
db:BIDid:36341date:2009-09-09T00:00:00
db:JVNDBid:JVNDB-2009-002121date:2009-10-21T00:00:00
db:PACKETSTORMid:81171date:2009-09-10T15:09:40
db:CNNVDid:CNNVD-200909-181date:2009-09-10T00:00:00
db:NVDid:CVE-2009-2795date:2009-09-10T21:30:01.170