ID

VAR-201006-0313


CVE

CVE-2010-1753


TITLE

Apple iOS of ImageIO Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2010-001676

DESCRIPTION

ImageIO in Apple iOS before 4 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG image. Apple iOS for iPhone and iPod touch is prone to multiple security vulnerabilities, including information-disclosure, remote code-execution, denial-of-service, security-bypass, and spoofing issues. These issues affect the Sandbox, CFNetwork, ImageIO, Passcode Lock, Safari, Settings, and WebKit components. Successfully exploiting these issues may allow attackers to crash the affected device, bypass security restrictions, obtain sensitive information, or execute arbitrary code. Other attacks are also possible. Versions prior to iOS 4 are vulnerable. This BID is being retired. The following individual records exist to better document the issues: 41047 Apple iPhone and iPod touch Application Sandbox User Photo Library Security Bypass Vulnerability 41048 Apple iPhone/iPod touch Prior to iOS 4 Wireless Network Security Weakness 41049 Apple iPhone/iPod touch Prior to iOS 4 URI Stack Based Buffer Overflow Vulnerability 41051 WebKit 'history.replaceState' Cross-Origin Information Disclosure Vulnerability 41052 Apple iPhone/iPod touch Prior to iOS 4 JPEG File Buffer Overflow Vulnerability 41053 WebKit 'JavaScriptCore' Page Transition Remote Code Execution Vulnerability 41054 WebKit Table Handling Remote Code Execution Vulnerability 41065 Apple iPhone/iPod touch Prior to iOS 4 Safari Security Bypass Vulnerability 41066 Apple iPhone and iPod touch Race Condition Security Bypass Vulnerability 41067 Apple iPhone/iPod touch Prior to iOS 4 Passcode Lock Authentication Bypass Vulnerability 41068 WebKit User Interface Cross Domain Spoofing Vulnerability. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Apple iOS is an operating system developed by Apple Inc. for the iPhone. It is mainly used for iPhone, iPod touch and iPad

Trust: 2.25

sources: NVD: CVE-2010-1753 // JVNDB: JVNDB-2010-001676 // BID: 41016 // BID: 41052 // VULHUB: VHN-44358

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:ltversion:4.0

Trust: 1.0

vendor:applemodel:iosscope:eqversion:2.0 to 3.1.3

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:2.1 to 3.1.3

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.1.3

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.6

vendor:applemodel:iosscope:neversion:4

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:3.0.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 0.6

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 0.6

sources: BID: 41016 // BID: 41052 // JVNDB: JVNDB-2010-001676 // CNNVD: CNNVD-201006-363 // NVD: CVE-2010-1753

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-1753
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-1753
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201006-363
value: MEDIUM

Trust: 0.6

VULHUB: VHN-44358
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-1753
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-44358
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-44358 // JVNDB: JVNDB-2010-001676 // CNNVD: CNNVD-201006-363 // NVD: CVE-2010-1753

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-44358 // JVNDB: JVNDB-2010-001676 // NVD: CVE-2010-1753

THREAT TYPE

network

Trust: 0.6

sources: BID: 41016 // BID: 41052

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201006-363

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001676

PATCH

title:HT4225url:http://support.apple.com/kb/HT4225

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2010-001676

EXTERNAL IDS

db:NVDid:CVE-2010-1753

Trust: 2.8

db:BIDid:41016

Trust: 2.0

db:XFid:59632

Trust: 0.8

db:JVNDBid:JVNDB-2010-001676

Trust: 0.8

db:CNNVDid:CNNVD-201006-363

Trust: 0.7

db:BIDid:41052

Trust: 0.4

db:VULHUBid:VHN-44358

Trust: 0.1

sources: VULHUB: VHN-44358 // BID: 41016 // BID: 41052 // JVNDB: JVNDB-2010-001676 // CNNVD: CNNVD-201006-363 // NVD: CVE-2010-1753

REFERENCES

url:http://lists.apple.com/archives/security-announce/2010/jun/msg00003.html

Trust: 1.7

url:http://www.securityfocus.com/bid/41016

Trust: 1.7

url:http://support.apple.com/kb/ht4225

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/59632

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1753

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/59632

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1753

Trust: 0.8

url:http://www.apple.com/iphone/softwareupdate/

Trust: 0.6

url:http://www.apple.com/iphone/

Trust: 0.6

url:http://www.apple.com/ipodtouch/

Trust: 0.6

sources: VULHUB: VHN-44358 // BID: 41016 // BID: 41052 // JVNDB: JVNDB-2010-001676 // CNNVD: CNNVD-201006-363 // NVD: CVE-2010-1753

CREDITS

Zac White; Laurent OUDOT of TEHTRI-Security; Ladd Van Tol of Critical Path Software; Apple; Jason Dent of Street Side Software; Sidney San Martin of DeepTech, Inc.; Wilfried Teiken; Darin Fisher of Google Inc.; Wayne Pan of AdMob, Inc.; wushi of team509.

Trust: 0.3

sources: BID: 41016

SOURCES

db:VULHUBid:VHN-44358
db:BIDid:41016
db:BIDid:41052
db:JVNDBid:JVNDB-2010-001676
db:CNNVDid:CNNVD-201006-363
db:NVDid:CVE-2010-1753

LAST UPDATE DATE

2024-11-23T20:43:17.227000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-44358date:2018-11-16T00:00:00
db:BIDid:41016date:2010-06-23T16:08:00
db:BIDid:41052date:2010-06-21T00:00:00
db:JVNDBid:JVNDB-2010-001676date:2010-07-14T00:00:00
db:CNNVDid:CNNVD-201006-363date:2022-08-10T00:00:00
db:NVDid:CVE-2010-1753date:2024-11-21T01:15:07.643

SOURCES RELEASE DATE

db:VULHUBid:VHN-44358date:2010-06-22T00:00:00
db:BIDid:41016date:2010-06-21T00:00:00
db:BIDid:41052date:2010-06-21T00:00:00
db:JVNDBid:JVNDB-2010-001676date:2010-07-14T00:00:00
db:CNNVDid:CNNVD-201006-363date:2010-06-24T00:00:00
db:NVDid:CVE-2010-1753date:2010-06-22T20:30:01.587