VARIoT IoT vulnerabilities database
| VAR-201209-0381 | CVE-2012-3742 | Apple iOS 6 Less than Safari In https Vulnerability spoofed connection |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Safari in Apple iOS before 6 does not properly restrict use of an unspecified Unicode character that looks similar to the https lock indicator, which allows remote attackers to spoof https connections by placing this character in the TITLE element of a web page. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a spoofing vulnerability.
Attackers may exploit this issue to spoof secure sites and create a false sense of trust. Successfully exploiting this issue may aid in phishing attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0379 | CVE-2012-3740 | Apple iOS 6 Vulnerabilities that can bypass passcode requests in less than passcode lock implementations |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Passcode Lock implementation in Apple iOS before 6 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A proximity attacker could exploit this vulnerability to bypass certain password requirements via an unidentified vector
| VAR-201209-0380 | CVE-2012-3741 | Apple iOS 6 In the implementation of restrictions less than Apple ID Vulnerabilities that bypass the authentication step |
CVSS V2: 1.9 CVSS V3: - Severity: LOW |
The Restrictions (aka Parental Controls) implementation in Apple iOS before 6 does not properly handle purchase attempts after a Disable Restrictions action, which allows local users to bypass an intended Apple ID authentication step via an app that performs purchase transactions. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A vulnerability exists in Apple's implementation of Restrictions (aka Parental Controls) in versions prior to iOS 6
| VAR-201209-0378 | CVE-2012-3739 | Apple iOS 6 Passcode Requirement Vulnerability in Implementation of Passcode Lock with Less Than |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Passcode Lock implementation in Apple iOS before 6 allows physically proximate attackers to bypass an intended passcode requirement via vectors involving use of the camera. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0376 | CVE-2012-3737 | Apple iOS 6 Vulnerability to display arbitrary saved photos in less than passcode lock implementation |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Passcode Lock implementation in Apple iOS before 6 does not properly restrict photo viewing, which allows physically proximate attackers to view arbitrary stored photos by spoofing a time value. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security weakness.
An attacker with physical access to the affected device can exploit this issue to access user information.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0375 | CVE-2012-3736 | Apple iOS 6 Vulnerable to bypassing passcode requests in less than passcode lock implementations |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
The Passcode Lock implementation in Apple iOS before 6 allows physically proximate attackers to bypass an intended passcode requirement via vectors related to ending a FaceTime call. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0377 | CVE-2012-3738 | Apple iOS 6 Vulnerability that bypasses access restrictions in less than passcode lock implementation |
CVSS V2: 3.6 CVSS V3: - Severity: LOW |
The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voice Dialing, or obtain sensitive contact information by attempting to make a FaceTime call and reading the contact suggestions. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security weakness.
An attacker with physical access to the affected device can exploit this issue to perform unauthorized actions and access user information.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0373 | CVE-2012-3734 | Apple iOS 6 Less than Office Viewer In Data Protection Vulnerabilities that are bypassed by level or encryption |
CVSS V2: 1.9 CVSS V3: - Severity: LOW |
Office Viewer in Apple iOS before 6 writes cleartext document data to a temporary file, which might allow local users to bypass a document's intended (1) Data Protection level or (2) encryption state by reading the temporary content. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a local information-disclosure vulnerability.
Local attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0374 | CVE-2012-3735 | Apple iOS 6 Vulnerabilities that allow you to view third-party applications used in the implementation of less than passcode lock |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Passcode Lock implementation in Apple iOS before 6 does not properly interact with the "Slide to Power Off" feature, which allows physically proximate attackers to see the most recently used third-party app by watching the device's screen. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security weakness.
An attacker with physical access to the affected device can exploit this issue to access user information.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0371 | CVE-2012-3732 | Apple iOS Forgery of signed content in email |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Mail in Apple iOS before 6 uses an S/MIME message's From address as the displayed sender address, which allows remote attackers to spoof signed content via an e-mail message in which the From field does not match the signer's identity. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a spoofing vulnerability that affects the 'Mail' component.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. The vulnerability stems from the use of the sender address of S/MIME messages to display the sender's address
| VAR-201209-0370 | CVE-2012-3731 | Apple iOS Vulnerabilities that can bypass passcode requests in email |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Mail in Apple iOS before 6 does not properly implement the Data Protection feature for e-mail attachments, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability. This may aid in further attacks.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A proximity attacker could exploit this vulnerability to bypass specially crafted password requirements via an unidentified vector
| VAR-201209-0372 | CVE-2012-3733 | Apple iOS 6 Vulnerabilities that can capture important information in messages less than |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Messages in Apple iOS before 6, when multiple iMessage e-mail addresses are configured, does not ensure that a reply's sender address matches the recipient address of the original message, which allows remote attackers to obtain potentially sensitive information about alternate e-mail addresses in opportunistic circumstances by reading a reply. TheBy reading the reply email, a third party may obtain important information about other email addresses. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability.
Attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0369 | CVE-2012-3730 | Apple iOS Forged file attachment vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Mail in Apple iOS before 6 does not properly handle reuse of Content-ID header values, which allows remote attackers to spoof attachments via a header value that was also used in a previous e-mail message, as demonstrated by a message from a different sender. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions by spoofing email attachments, allowing the attacker to perform malicious activities. Other attacks may also be possible.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0367 | CVE-2012-3728 | Apple iOS Privileged vulnerability in Kernel |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
The kernel in Apple iOS before 6 dereferences invalid pointers during the handling of packet-filter data structures, which allows local users to gain privileges via a crafted program that makes packet-filter ioctl calls. Apple iOS for the iPhone, the iPod touch, andthe iPad is prone to a local privilege-escalation vulnerability that affects the kernel.
Local attackers can exploit this issue to alter kernel memory and execute arbitrary code with system-level privileges.
Successfully exploiting this issue can allow attackers to elevate privileges, leading to a complete compromise of the device.
This issue is fixed in Apple iOS 6 version.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it
| VAR-201209-0368 | CVE-2012-3729 | Apple iOS Vulnerabilities in which important information is obtained in the kernel |
CVSS V2: 1.9 CVSS V3: - Severity: LOW |
The Berkeley Packet Filter (BPF) interpreter implementation in the kernel in Apple iOS before 6 accesses uninitialized memory locations, which allows local users to obtain sensitive information about the layout of kernel memory via a crafted program that uses a BPF interface. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability.
An attacker can exploit this issue to view content from the kernel memory. This may allow the attacker to obtain sensitive information or aid in further attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. The vulnerability stems from accessing uninitialized memory locations
| VAR-201209-0366 | CVE-2012-3727 | Apple iOS of IPsec Component buffer overflow vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Buffer overflow in the IPsec component in Apple iOS before 6 allows remote attackers to execute arbitrary code via a crafted racoon configuration file. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a buffer-overflow vulnerability.
Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of the affected application. Failed exploit attempts may cause denial-of-service conditions.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0363 | CVE-2012-3724 | Apple iOS of CFNetwork Vulnerability in which important information is obtained |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
CFNetwork in Apple iOS before 6 does not properly identify the host portion of a URL, which allows remote attackers to obtain sensitive information by leveraging the construction of an HTTP request with an incorrect hostname derived from a malformed URL. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability.
Attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A vulnerability exists in CFNetwork in versions prior to Apple iOS 6 due to partial URLs not correctly identifying hosts
| VAR-201209-0364 | CVE-2012-3725 | Apple iOS of DHCP Vulnerabilities that can capture important information in components |
CVSS V2: 3.3 CVSS V3: - Severity: LOW |
The DNAv4 protocol implementation in the DHCP component in Apple iOS before 6 sends Wi-Fi packets containing a MAC address of a host on a previously used network, which might allow remote attackers to obtain sensitive information about previous device locations by sniffing an unencrypted Wi-Fi network for these packets. Apple iOS of DHCP In the component DNAv4 The protocol is implemented by the host on the network used immediately before.
Successfully exploiting this issue will allow attackers to determine networks a device has previously accessed.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2012-09-24-1 Apple TV 5.1
Apple TV 5.1 is now available and addresses the following:
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: An uninitialized memory access existed in the handling
of Sorenson encoded movie files. This issue was addressed through
improved memory initialization. This issue was addressed by disabling DNAv4 on unencrypted
Wi-Fi networks
CVE-ID
CVE-2012-3725 : Mark Wuergler of Immunity, Inc.
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Viewing a maliciously crafted TIFF file may lead to an
unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in libtiff's handling of
ThunderScan encoded TIFF images. This issue was addressed by updating
libtiff to version 3.9.5.
CVE-ID
CVE-2011-1167
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Viewing a maliciously crafted PNG image may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in libpng's
handling of PNG images. These issues were addressed through improved
validation of PNG images.
CVE-ID
CVE-2011-3026 : Juri Aedla
CVE-2011-3048
CVE-2011-3328
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Viewing a maliciously crafted JPEG image may lead to an
unexpected application termination or arbitrary code execution
Description: A double free issue existed in ImageIO's handling of
JPEG images. This issue was addressed through improved memory
management.
CVE-ID
CVE-2012-3726 : Phil of PKJE Consulting
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Viewing a maliciously crafted TIFF image may lead to an
unexpected application termination or arbitrary code execution
Description: An integer overflow issue existed in libTIFF's handling
of TIFF images. This issue was addressed through improved validation
of TIFF images. This issue does not affect OS X Mountain Lion
systems.
CVE-ID
CVE-2012-1173
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Applications that use ICU may be vulnerable to an unexpected
application termination or arbitrary code execution
Description: A stack buffer overflow existed in the handling of ICU
locale IDs. This issue was addressed through improved bounds
checking.
CVE-ID
CVE-2011-4599
Apple TV
Available for: Apple TV 2nd generation and later
Impact: An attacker with a privileged network position may cause an
unexpected application termination or arbitrary code execution
Description: Multiple vulnerabilities existed in libxml, the most
serious of which may lead to an unexpected application termination or
arbitrary code execution. These issues were addressed by applying the
relevant upstream patches.
CVE-ID
CVE-2011-1944 : Chris Evans of Google Chrome Security Team
CVE-2011-2821 : Yang Dingning of NCNIPC, Graduate University of
Chinese Academy of Sciences
CVE-2011-2834 : Yang Dingning of NCNIPC, Graduate University of
Chinese Academy of Sciences
CVE-2011-3919 : Juri Aedla
Apple TV
Available for: Apple TV 2nd generation and later
Impact: An attacker with a privileged network position may cause an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in
JavaScriptCore. These issues were addressed through improved memory
handling.
CVE-ID
CVE-2012-0682 : Apple Product Security
CVE-2012-0683 : Dave Mandelin of Mozilla
CVE-2012-3589 : Dave Mandelin of Mozilla
CVE-2012-3590 : Apple Product Security
CVE-2012-3591 : Apple Product Security
CVE-2012-3592 : Apple Product Security
CVE-2012-3678 : Apple Product Security
CVE-2012-3679 : Chris Leary of Mozilla
Installation note:
Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> General -> Update Software".
To check the current version of software, select
"Settings -> General -> About".
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
iQIcBAEBAgAGBQJQXO50AAoJEPefwLHPlZEwc40P/AmBKys+PAsdT8gGrSpOY1B9
8h+Y0xdE+Hmesq9D4p6wvdY/lR+zMqtSwT6amNImYCIaRmm1P8+r8n31be52TYlg
7GqEAZbDtFztHwIISC8Khf8dMvWSrLhzRa7X/cxlIgRKmoXFnqJZzYcUov/M9Uw8
KwejQnztmAx7srHnZCNI+dxFqAC7hPoegnDnlVPx1DkwKDjt8q9xD3PGQyiGWWkI
wqUEWvMGWr65CFyA7R0hDqKuNCowWn2cKP1UhIoEur5yRmc4aQVtOnHhJ8k9mdoO
+58JC/y8lCtqGUyEL2Ar0FmIcRX/GJf+/isKOtmHx0JuEhH5beQ6s9FxU5eNR9DH
EVPmVXowY9wMvKxwHFU3jwq8kQ3+IYC+7KA6lScb5mXO5mC5dbJPLp7uJto7+VtI
atgQmvzdB8G562wpwTPuA4UQWWr0i6WWl8zkfgkRHO+cXyN683rkBP/vVEo9FipR
YkQ10RsXqYDRXBcRywmTZZwQy6txMtV9D2bnk1uukQHBsZh30/mEpcmZbo6CO3s3
mnOtu5D2OQsNt4MqbviUkEgdc9JIJnqAOo+9YguDCEu6Rd7unbKB3RpmD+A3OJnR
GhEa2Gqyvm/ozfb2D4L01y4UQo7dMLw+t/FOZXkrpdLlWn2LANWvXDCPSzIFCKoN
cXF+ij425pfY+d7Iekz3
=PSL+
-----END PGP SIGNATURE-----
| VAR-201209-0365 | CVE-2012-3726 | Apple iOS of ImageIO Memory double free vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Double free vulnerability in ImageIO in Apple iOS before 6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to remote code-execution vulnerability.
Successfully exploiting this issue will allow the attacker to execute arbitrary code in the context of the affected application. Failed exploit attempts may result in a denial-of-service condition.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A double free vulnerability exists in ImageIO in versions prior to Apple iOS 6. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2012-09-24-1 Apple TV 5.1
Apple TV 5.1 is now available and addresses the following:
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termination or arbitrary code execution
Description: An uninitialized memory access existed in the handling
of Sorenson encoded movie files. This issue was addressed through
improved memory initialization.
CVE-ID
CVE-2012-3722 : Will Dormann of the CERT/CC
Apple TV
Available for: Apple TV 2nd generation and later
Impact: A malicious Wi-Fi network may be able to determine networks
a device has previously accessed
Description: Upon connecting to a Wi-Fi network, iOS may broadcast
MAC addresses of previously accessed networks per the DNAv4
protocol. This issue was addressed by disabling DNAv4 on unencrypted
Wi-Fi networks
CVE-ID
CVE-2012-3725 : Mark Wuergler of Immunity, Inc.
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Viewing a maliciously crafted TIFF file may lead to an
unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in libtiff's handling of
ThunderScan encoded TIFF images. This issue was addressed by updating
libtiff to version 3.9.5.
CVE-ID
CVE-2011-1167
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Viewing a maliciously crafted PNG image may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in libpng's
handling of PNG images. These issues were addressed through improved
validation of PNG images. This issue was addressed through improved memory
management.
CVE-ID
CVE-2012-3726 : Phil of PKJE Consulting
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Viewing a maliciously crafted TIFF image may lead to an
unexpected application termination or arbitrary code execution
Description: An integer overflow issue existed in libTIFF's handling
of TIFF images. This issue was addressed through improved validation
of TIFF images. This issue does not affect OS X Mountain Lion
systems.
CVE-ID
CVE-2012-1173
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Applications that use ICU may be vulnerable to an unexpected
application termination or arbitrary code execution
Description: A stack buffer overflow existed in the handling of ICU
locale IDs. This issue was addressed through improved bounds
checking. These issues were addressed by applying the
relevant upstream patches.
CVE-ID
CVE-2011-1944 : Chris Evans of Google Chrome Security Team
CVE-2011-2821 : Yang Dingning of NCNIPC, Graduate University of
Chinese Academy of Sciences
CVE-2011-2834 : Yang Dingning of NCNIPC, Graduate University of
Chinese Academy of Sciences
CVE-2011-3919 : Juri Aedla
Apple TV
Available for: Apple TV 2nd generation and later
Impact: An attacker with a privileged network position may cause an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in
JavaScriptCore. These issues were addressed through improved memory
handling.
CVE-ID
CVE-2012-0682 : Apple Product Security
CVE-2012-0683 : Dave Mandelin of Mozilla
CVE-2012-3589 : Dave Mandelin of Mozilla
CVE-2012-3590 : Apple Product Security
CVE-2012-3591 : Apple Product Security
CVE-2012-3592 : Apple Product Security
CVE-2012-3678 : Apple Product Security
CVE-2012-3679 : Chris Leary of Mozilla
Installation note:
Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> General -> Update Software".
To check the current version of software, select
"Settings -> General -> About".
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org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=PSL+
-----END PGP SIGNATURE-----
| VAR-201209-0362 | CVE-2012-3723 | Apple Mac OS X Vulnerable to arbitrary code execution |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
Apple Mac OS X before 10.7.5 does not properly handle the bNbrPorts field of a USB hub descriptor, which allows physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) by attaching a USB device. Apple Mac OS X is prone to a local memory-corruption vulnerability.
Successful exploits may allow attackers to execute arbitrary code within the context of the affected application. Failed attacks may cause a denial-of-service condition.
NOTE: This issue was previously discussed in BID 55623 (Apple Mac OS X Security Update 2012-004 Multiple Security Vulnerabilities) but has been given its own record to better document it. ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released.
Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
----------------------------------------------------------------------
TITLE:
Apple Mac OS X Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA50628
VERIFY ADVISORY:
Secunia.com
http://secunia.com/advisories/50628/
Customer Area (Credentials Required)
https://ca.secunia.com/?page=viewadvisory&vuln_id=50628
RELEASE DATE:
2012-09-20
DISCUSS ADVISORY:
http://secunia.com/advisories/50628/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA:
* Last Update
* Popularity
* Comments
* Criticality Level
* Impact
* Where
* Solution Status
* Operating System / Software
* CVE Reference(s)
http://secunia.com/advisories/50628/
ONLY AVAILABLE IN CUSTOMER AREA:
* Authentication Level
* Report Reliability
* Secunia PoC
* Secunia Analysis
* Systems Affected
* Approve Distribution
* Remediation Status
* Secunia CVSS Score
* CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50628
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:
* AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/
http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION:
Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities.
1) Various vulnerabilities exist in the bundled version of Apache.
For more information:
SA46288
SA45793
SA46987
SA47779
SA47410
2) An assertion error in BIND when handling DNS records can be
exploited to cause a DoS (Denial of Service).
For more information:
SA46887
3) An error in BIND can be exploited to disclose potentially
sensitive information or cause a DoS.
For more information:
SA49338
4) An error in the CoreText component when handling text glyphs can
be exploited to cause a buffer overflow and potentially compromise an
application using the component.
5) An error in the DirectoryService Proxy can be exploited to cause a
buffer overflow.
6) Errors in the ImageIO component when parsing PNG images can be
exploited to corrupt memory.
For more information:
SA48026
SA48587
7) An integer overflow error in the ImageIO component when parsing
TIFF images can be exploited to cause a buffer overflow.
For more information:
SA48684#1
8) A previous fix did not properly address an error in the Installer
component that allowed users to obtain account information. The
original fix ensured that passwords were not recorded to the system
log, but did not remove the old system log entries containing
passwords.
This is related to:
SA49039#1
9) An error in International Components for Unicode (ICU) when
handling ICU locale IDs can be exploited to cause a stack-based
buffer overflow.
For more information:
SA47146
10) A logic error in the kernel when handling debug system calls can
be exploited by a malicious program to bypass sandbox restrictions.
For more information:
SA48288#3
11) An error in the LoginWindow component can be exploited by local
users to obtain other users' login passwords.
12) An input validation error in Mail can be exploited to execute web
plugins when viewing an e-mail message.
13) An error in Mobile Accounts can be exploited by a user with
access to the contents of a mobile account to obtain the account
password.
14) Multiple errors exist in the bundled version of PHP.
For more information:
SA49014
SA44335
15) An authentication error in Profile Manager Device Management
private interface can be exploited to enumerate managed devices.
16) Various errors exist in the bundled versions of QuickLook and
QuickTime.
For more information:
SA47447
17) An uninitialised memory access error exists in QuickTime when
viewing Sorenson-encoded movie files.
18) An error in Ruby may allow decryption of SSL-protected data when
a cipher suite uses a block cipher in CBC mode.
19) An error in the USB component can be exploited to corrupt memory
by attaching a malicious USB device.
SOLUTION:
Update to version 10.8.2 or 10.7.5 or apply Security Update 2012-004.
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
4) Jesse Ruderman, Mozilla Corporation
5) aazubel via ZDI
11) An anonymous person
12, 17) Will Dormann, CERT/CC
13) Harald Wagener, Google
15) Derick Cassidy, XEquals Corporation
19) Andy Davis, NGS Secure
ORIGINAL ADVISORY:
Apple:
http://support.apple.com/kb/HT5501
OTHER REFERENCES:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
DEEP LINKS:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
EXPLOIT:
Further details available in Customer Area:
http://secunia.com/vulnerability_intelligence/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
private users keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------