Secunia Logo  


Secunia PSI WorldMap
 
Apple iPhone / iPod touch Multiple Vulnerabilities
Secunia Advisory: SA36677
Release Date: 2009-09-10
Popularity: 376 views

Critical:
Highly critical
Impact: Security Bypass
Cross Site Scripting
Spoofing
Exposure of sensitive information
DoS
System access
Where: From remote
Solution Status: Vendor Patch

OS:Apple iPhone
Apple iPod touch

Secunia CVSS-2 Score: Available in Secunia business solutions

Subscribe: Instant alerts on relevant vulnerabilities


Advisory Content (Page 1 of 3)[ 1 ] [ 2 ] [ 3 ]

Description:
Some vulnerabilities, security issues, and weaknesses have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people with physical access to the device to bypass certain security restrictions or disclose sensitive information, and by malicious people to disclose sensitive information, conduct cross-site scripting and spoofing attacks, cause a DoS (Denial of Service), or to compromise a user's system.

1) An error in CoreAudio when processing sample size table entries of AAC and MP3 files can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code.

2) An error in Exchange Support exists due to the "Require Passcode" setting not being affected by the "Maximum inactivity time lock" setting. This may lead to a time window, regardless of the Maximum inactivity time lock" setting, in which a person with physical access to the device is able to use the Exchange services.

3) A security issue exists in MobileMail due to deleted mails being accessible via Spotlight search. This can be exploited by malicious people with physical access to the device to disclose potentially sensitive information.

4) An unspecified error exists in the Recovery Mode command parsing. This can be exploited by a person with physical access to a device to cause a heap-based buffer overflow and e.g. gain access to a locked device.

5) A NULL pointer dereference error within the handling of SMS arrival notifications can be exploited to cause a service interruption.

6) An error in the handling of passwords in UIKit can be exploited by a person with physical access to a device to disclose a password.

7) Safari includes the user name and password in the "Referer" header, which can lead to the exposure of sensitive information.

8) Two vulnerabilities in WebKit can be exploited by malicious people to conduct cross-site scripting attacks or potentially compromise a user's system.

For more information:
SA35758

9) A vulnerability in WebKit can be exploited by malicious people to conduct spoofing attacks.

For more information see vulnerability #6 in:
SA36269

Change Page:
[ 1 ] [ 2 ] [ 3 ]



Track this Secunia Advisory
Customers of the Secunia Vulnerability Intelligence solutions will automatically receive updates when new information regarding this advisory is released.

Read more about our Vulnerability Intelligence solutions and what they can do for you and your company.

About this Secunia Advisory
Please note: The information that this Secunia Advisory is based on comes from a third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.
  
Latest Advisories

Send Feedback to Secunia
If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback are most welcome.

Most Popular - 3 Hours

1. Mozilla Firefox Multiple Vulnerabilities // 129 views
2. Mozilla Firefox Temporary File Download Manipulation Security Issue // 127 views
3. Adobe Flash Player Multiple Vulnerabilities // 79 views
4. Apple QuickTime Multiple Vulnerabilities // 64 views
5. Internet Explorer Charset Inheritance Cross-Site Scripting Vulnerability // 41 views
6. Microsoft Windows TCP/IP Implementation Multiple Vulnerabilities // 31 views
7. Altirix eXpress NS SC Download ActiveX Control "DownloadAndInstall()" Insecure Method // 28 views
8. Apple iPhone / iPod touch Multiple Vulnerabilities // 24 views
9. phpJobScheduler "installed_config_file" File Inclusion Vulnerabilities // 22 views
10. Windows 2000 / XP TCP/IP Window Size Denial of Service Vulnerabilities // 20 views