Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-3253 (GCVE-0-2011-3253)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:29:56.486Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "APPLE-SA-2011-10-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4999" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2011-10-14T10:00:00Z", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "APPLE-SA-2011-10-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4999" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2011-3253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2011-10-12-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "name": "http://support.apple.com/kb/HT4999", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4999" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2011-3253", "datePublished": "2011-10-14T10:00:00Z", "dateReserved": "2011-08-19T00:00:00Z", "dateUpdated": "2024-09-16T20:07:09.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-3253\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2011-10-14T10:55:09.887\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate.\"},{\"lang\":\"es\",\"value\":\"CalDAV en Apple iOS antes de v5 no valida los certificados X.509 para las sesiones de SSL, lo que permite a atacantes de tipo hombre-en-el-medio (\\\"man-in-the-middle\\\") falsificar los servidores de calendario y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado de su elecci\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:N/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"A066B59B-D5C8-4AA8-9CC7-5D34F4AB88AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51D3BE2B-5A01-4AD4-A436-0056B50A535D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"E357722F-4976-4E47-BFB5-709480BAE267\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"F43A6FEC-ECA9-44A4-AD00-FDC6F3990DC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"7CA92907-90C9-4BD6-8EE8-8FA6298C3D0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"220590DA-2B6A-4FC9-B456-3053EED9D96E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"3FE3CDE8-6497-445E-A845-8A1C2A4EDEB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"9E4D3134-28BC-4C30-A9B0-559338FBBDFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A939B80-0AD0-48AF-81A7-370716F56639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*\",\"matchCriteriaId\":\"98C41674-370B-4CF0-817B-3843D93A10DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28528CE-4943-4F82-80C0-A629DA3E6702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12E22AF0-2B66-425A-A1EE-4F0E3B0433E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"954CDDCB-AC22-448D-8ECA-CFA4DBA1BC27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"54FECD66-4216-43FC-9959-B8EA9545449C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB34ECBE-33E8-40E1-936B-7800D2525AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*\",\"matchCriteriaId\":\"ECE983F6-A597-4581-A254-80396B54F2D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"586C0CB3-98E5-4CB3-8F23-27F01233D6C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107C59BE-D8CF-4A17-8DFB-BED2AB12388D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36C86BB9-0328-4E34-BC2B-47B3471EC262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54A8681-2D8A-4B0B-A947-82F3CE1FB03C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0070D83-2E27-4DA8-8D10-A6A697216F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C9ACA63-4528-4090-B1EA-1FE57A6B0555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7252935C-E421-4339-B61F-0299E28888DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DD342BF-096A-4082-B700-19629F2BDE87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93141AB6-26F2-4C6D-95B3-D383EABB4034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D5C61FF-7CD3-410A-94F2-5DE701466B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A01C87-B02A-4239-8340-B396D0E6B21C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*\",\"matchCriteriaId\":\"396634C5-774C-4131-B927-3CAD239EF0B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*\",\"matchCriteriaId\":\"64FF0F29-B3C2-4BDC-89FF-DBEDE87D64A4\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4999\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT4999\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
gsd-2011-3253
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-3253", "description": "CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate.", "id": "GSD-2011-3253" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-3253" ], "details": "CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate.", "id": "GSD-2011-3253", "modified": "2023-12-13T01:19:09.108069Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2011-3253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2011-10-12-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "name": "http://support.apple.com/kb/HT4999", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4999" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2011-3253" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "http://support.apple.com/kb/HT4999", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT4999" }, { "name": "APPLE-SA-2011-10-12-1", "refsource": "APPLE", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2011-10-14T10:55Z", "publishedDate": "2011-10-14T10:55Z" } } }
var-201110-0318
Vulnerability from variot
CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate. Apple iOS is prone to an information-disclosure vulnerability that affects the calendar synchronization feature. Attackers can exploit this issue to obtain sensitive information from CalDAV communications. An attacker can exploit this issue through man-in-the-middle attacks by impersonating a trusted server. This may allow the attacker to obtain credentials or other sensitive information or give users a false sense of security. Information harvested may aid in further attacks. NOTE: This issue was previously discussed in BID 50086 (Apple iPhone/iPad/iPod touch Prior to iOS 5 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. ----------------------------------------------------------------------
Ovum says ad hoc tools are out-dated. The best practice approach? Fast vulnerability intelligence, threat handling, and setup in one tool.
Read the new report on the Secunia VIM: http://secunia.com/products/corporate/vim/ovum_2011_request/
TITLE: Apple iOS Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA46377
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46377/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46377
RELEASE DATE: 2011-10-14
DISCUSS ADVISORY: http://secunia.com/advisories/46377/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/46377/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=46377
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to disclose certain information and by malicious people to conduct script insertion, cross-site scripting, and spoofing attacks, disclose sensitive information, bypass certain security restrictions, cause a DoS (Denial of Service), and compromise a user's device.
1) An error within the CalDAV component does not properly validate the SSL certificate when synchronizing the calendar, which can be exploited to disclose encrypted information e.g. using a Man-in-the-Middle (MitM) attack.
2) Input passed via invitation notes is not properly sanitised in Calendar before being returned to the user. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious invitation is being viewed.
3) The CFNetwork component stores a user's AppleID password and username in the log file readable by applications, which can be exploited to disclose the credentials.
4) The CFNetwork component does not properly restrict cross-domain access of HTTP cookies, which can be exploited to access the cookies of another web site.
5) An error exists within CoreFoundation when handling string tokenization.
For more information see vulnerability #1 in: SA46339
6) Multiple errors within CoreGraphics when handling the certain freetype fonts can be exploited to corrupt memory.
7) An error within CoreMedia does not properly handle cross-site redirects and can be exploited to disclose video data.
8) An error exits within the Data Access component when handling multiple accounts configured on the same server and can be exploited to disclose the cookie of another account.
9) The application accepts X.509 certificates with MD5 hashes, which could lead to weak cryptographic certificates being used. This can be exploited to disclose encrypted information e.g. using a Man-in-the-Middle (MitM) attack.
10) A design error exists within the implementation of SSL 3.0 and TLS 1.0 protocols.
For more information: SA46168
11) An error within ImageIO when handling CCITT Group 4 encoded TIFF files can be exploited to cause a buffer overflow.
For more information see vulnerability #1 in: SA43593
12) An error in ImageIO within the handling of CCITT Group 4 encoded TIFF image files can be exploited to cause a heap-based buffer overflow.
For more information see vulnerability #9 in: SA45325
13) An error within ICU (International Components for Unicode) can be exploited to cause a buffer overflow.
For more information see vulnerability #11 in: SA45054
14) An error within the kernel does not reclaim memory from incomplete TCP connections, which can be exploited to exhaust system resources by connecting to a listening service and cause the device to reset.
15) A NULL-pointer dereference error within the kernel when handling IPv6 socket options can be exploited to cause the device to reset.
16) An error within libxml can be exploited to cause a heap-based buffer overflow.
For more information see vulnerability #12 in: SA45325
17) An error within OfficeImport when viewing certain Microsoft Word files can be exploited to cause a buffer overflow.
18) An error within OfficeImport when viewing certain Microsoft Excel files can be exploited to cause a buffer overflow.
19) An indexing error exists in the OfficeImport framework when processing certain records in a Microsoft Word file.
For more information see vulnerability #19 in: SA45054
20) An error in the OfficeImport framework when processing records can be exploited to corrupt memory.
For more information see vulnerability #28 in: SA43814
21) An error within Safari does not properly handle the "attachment" HTTP Content-Disposition header and can be exploited to conduct cross-site scripting attacks.
22) The parental restrictions feature stores the restrictions passcode in plaintext on disk and can be exploited to disclose the passcode.
23) An error within UIKit does not properly handle "tel:" URIs and can be exploited to cause the device to hang by tricking the user into visiting a malicious website.
24) Some vulnerabilities are caused due to a bundled vulnerable version of WebKit.
For more information: SA43519 SA43683 SA43696 SA43859 SA45097 SA45325 SA45325 SA45498 SA45498 SA46339 SA46412
25) The WiFi credentials are stored in a file readable by other applications, which may lead to the credentials being disclosed.
Successful exploitation of vulnerabilities #6, #16 \x96 #20, and #24 may allow execution of arbitrary code.
SOLUTION: Apply iOS 5 Software Update.
PROVIDED AND/OR DISCOVERED BY: 1) Leszek Tasiemski, nSense. 6, 9) Reported by the vendor.
The vendor credits: 2) Rick Deacon 3) Peter Quade, qdevelop 4) Erling Ellingsen, Facebook. 7) Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR) 8) Bob Sielken, IBM 14) Wouter van der Veer, Topicus and Josh Enders 15) Thomas Clement, Intego 17) Tobias Klein via iDefense. 18) Tobias Klein, www.trapkit.de 21) Christian Matthies via iDefense and Yoshinori Oota, Business Architects via JP/CERT. 22) An anonymous person 23) Simon Young, Anglia Ruskin University 25) Laurent OUDOT, TEHTRI Security
ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT4999
nSense: http://www.nsense.fi/advisories/nsense_2011_006.txt
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. nSense Vulnerability Research Security Advisory NSENSE-2011-006 --------------------------------------------------------------- t2'11 infosec conference special release http://www.t2.fi ---------------------------------------------------------------
Affected Vendor: Apple Inc.
Affected Product: CalDAV (iOS 3.0 through 4.3.5 for iPhone 3GS
and iPhone 4, iOS 3.1 through 4.3.5 for iPod
touch (3rd generation) and later, iOS 3.2
through 4.3.5 for iPad)
Platform: iOS
Impact: Sensitive information interception
Vendor response: New version released
CVE: CVE-2011-3253
Credit: Leszek / nSense
Release date: 12 Oct 2011
Technical details
---------------------------------------------------------------
The calendar synchronization feature of iOS fails to validate
the SSL certificate provided by the server. Therefore, CalDAV
communication can be intercepted by a basic man in the middle
attack. As every request contains a HTTP basic authentication
header, which contains base64-encoded credentials, it is
possible to intercept email account credentials by an attacker
that is suitably positioned (e.g. the same LAN, WLAN) or is
able to tamper with DNS records pointing to the CalDAV server.
The application accepts the untrusted certificate without any
warning or prompt, so the attack will go unnoticed by the user.
Timeline:
20110407 nSense informed the vendor about the vulnerability
20110409 Vendor started to investigate the issue
20110415 nSense sent a status update request to the vendor
20110415 Vendor provided a status update
20110420 nSense asked the vendor for further information
20110502 nSense resent the previous questions
20110502 Vendor confirmed the vulnerability
20110525 nSense asked the vendor about the patch schedule
20110527 Vendor responded
20110527 nSense asked the vendor for further information
20110531 Vendor responded, unable to provide a date
20110601 nSense asked the vendor for clarification
20110603 Vendor responded
20110603 nSense resent the previous question
20110607 nSense commented the issue, asked the vendor for
clarification
20110705 nSense asked the vendor for clarification
20110726 nSense asked the vendor whether 4.3.5 fixed the
issue
20110727 Vendor responded. Issue not fixed.
20110728 nSense asked the vendor for further details
20110917 Vendor asked for credit information
20110917 nSense responded
20111002 Vendor confirmed release date
20111012 Vendor releases fixed version of the software
20111012 Vendor releases public advisory
Solution:
Apple security updates are available via the Software Update
mechanism: http://support.apple.com/kb/HT1338
Apple security updates are also available for manual download
via: http://www.apple.com/support/downloads/
More information from Apple Inc.:
http://support.apple.com/kb/HT1222
Links:
http://www.nsense.fi http://www.nsense.dk
$$s$$$$s. ,s$$$$s ,S$$$$$s. $$s$$$$s. ,s$$$$s ,S$$$$$s.
$$$ `$$$ ($$( $$$ `$$$ $$$ `$$$ ($$( $$$ `$$$
$$$ $$$ `^$$s. $$$$$$$$$ $$$ $$$ `^$$s. $$$$$$$$$
$$$ $$$ )$$) $$$ $$$ $$$ )$$) $$$
$$$ $$$ ^$$$$$$7 `7$$$$$P $$$ $$$ ^$$$$$$7 `7$$$$$P
D r i v e n b y t h e c h a l l e n g e _
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201110-0318", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.3.5" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.3.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.3.3" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.2.5" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.3.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.3.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.2.8" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.0 to 4.3.5 (iphone 3gs and iphone 4)" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.1 to 4.3.5 (ipod touch (3rd generation) after )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.2 to 4.3.5 (ipad for )" }, { "model": "ipad", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "iphone", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.9" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.8" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.7" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.6" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.10" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5" } ], "sources": [ { "db": "BID", "id": "50149" }, { "db": "JVNDB", "id": "JVNDB-2011-002462" }, { "db": "CNNVD", "id": "CNNVD-201110-330" }, { "db": "NVD", "id": "CVE-2011-3253" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:iphone_os", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipad", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:iphone", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipod_touch", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002462" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Leszek Tasiemski of nSense", "sources": [ { "db": "BID", "id": "50149" } ], "trust": 0.3 }, "cve": "CVE-2011-3253", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2011-3253", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "VHN-51198", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-3253", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2011-3253", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-201110-330", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-51198", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-51198" }, { "db": "JVNDB", "id": "JVNDB-2011-002462" }, { "db": "CNNVD", "id": "CNNVD-201110-330" }, { "db": "NVD", "id": "CVE-2011-3253" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate. Apple iOS is prone to an information-disclosure vulnerability that affects the calendar synchronization feature. \nAttackers can exploit this issue to obtain sensitive information from CalDAV communications. \nAn attacker can exploit this issue through man-in-the-middle attacks by impersonating a trusted server. This may allow the attacker to obtain credentials or other sensitive information or give users a false sense of security. Information harvested may aid in further attacks. \nNOTE: This issue was previously discussed in BID 50086 (Apple iPhone/iPad/iPod touch Prior to iOS 5 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. ----------------------------------------------------------------------\n\nOvum says ad hoc tools are out-dated. The best practice approach?\nFast vulnerability intelligence, threat handling, and setup in one tool. \n\nRead the new report on the Secunia VIM:\nhttp://secunia.com/products/corporate/vim/ovum_2011_request/ \n\n----------------------------------------------------------------------\n\nTITLE:\nApple iOS Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA46377\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/46377/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46377\n\nRELEASE DATE:\n2011-10-14\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/46377/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/46377/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46377\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nMultiple vulnerabilities have been reported in Apple iOS, which can\nbe exploited by malicious people with physical access to disclose\ncertain information and by malicious people to conduct script\ninsertion, cross-site scripting, and spoofing attacks, disclose\nsensitive information, bypass certain security restrictions, cause a\nDoS (Denial of Service), and compromise a user\u0027s device. \n\n1) An error within the CalDAV component does not properly validate\nthe SSL certificate when synchronizing the calendar, which can be\nexploited to disclose encrypted information e.g. using a\nMan-in-the-Middle (MitM) attack. \n\n2) Input passed via invitation notes is not properly sanitised in\nCalendar before being returned to the user. This can be exploited to\ninsert arbitrary HTML and script code, which will be executed in a\nuser\u0027s browser session in context of an affected site when the\nmalicious invitation is being viewed. \n\n3) The CFNetwork component stores a user\u0027s AppleID password and\nusername in the log file readable by applications, which can be\nexploited to disclose the credentials. \n\n4) The CFNetwork component does not properly restrict cross-domain\naccess of HTTP cookies, which can be exploited to access the cookies\nof another web site. \n\n5) An error exists within CoreFoundation when handling string\ntokenization. \n\nFor more information see vulnerability #1 in:\nSA46339\n\n6) Multiple errors within CoreGraphics when handling the certain\nfreetype fonts can be exploited to corrupt memory. \n\n7) An error within CoreMedia does not properly handle cross-site\nredirects and can be exploited to disclose video data. \n\n8) An error exits within the Data Access component when handling\nmultiple accounts configured on the same server and can be exploited\nto disclose the cookie of another account. \n\n9) The application accepts X.509 certificates with MD5 hashes, which\ncould lead to weak cryptographic certificates being used. This can be\nexploited to disclose encrypted information e.g. using a\nMan-in-the-Middle (MitM) attack. \n\n10) A design error exists within the implementation of SSL 3.0 and\nTLS 1.0 protocols. \n\nFor more information:\nSA46168\n\n11) An error within ImageIO when handling CCITT Group 4 encoded TIFF\nfiles can be exploited to cause a buffer overflow. \n\nFor more information see vulnerability #1 in:\nSA43593\n\n12) An error in ImageIO within the handling of CCITT Group 4 encoded\nTIFF image files can be exploited to cause a heap-based buffer\noverflow. \n\nFor more information see vulnerability #9 in:\nSA45325\n\n13) An error within ICU (International Components for Unicode) can be\nexploited to cause a buffer overflow. \n\nFor more information see vulnerability #11 in:\nSA45054\n\n14) An error within the kernel does not reclaim memory from\nincomplete TCP connections, which can be exploited to exhaust system\nresources by connecting to a listening service and cause the device\nto reset. \n\n15) A NULL-pointer dereference error within the kernel when handling\nIPv6 socket options can be exploited to cause the device to reset. \n\n16) An error within libxml can be exploited to cause a heap-based\nbuffer overflow. \n\nFor more information see vulnerability #12 in:\nSA45325\n\n17) An error within OfficeImport when viewing certain Microsoft Word\nfiles can be exploited to cause a buffer overflow. \n\n18) An error within OfficeImport when viewing certain Microsoft Excel\nfiles can be exploited to cause a buffer overflow. \n\n19) An indexing error exists in the OfficeImport framework when\nprocessing certain records in a Microsoft Word file. \n\nFor more information see vulnerability #19 in:\nSA45054\n\n20) An error in the OfficeImport framework when processing records\ncan be exploited to corrupt memory. \n\nFor more information see vulnerability #28 in:\nSA43814\n\n21) An error within Safari does not properly handle the \"attachment\"\nHTTP Content-Disposition header and can be exploited to conduct\ncross-site scripting attacks. \n\n22) The parental restrictions feature stores the restrictions\npasscode in plaintext on disk and can be exploited to disclose the\npasscode. \n\n23) An error within UIKit does not properly handle \"tel:\" URIs and\ncan be exploited to cause the device to hang by tricking the user\ninto visiting a malicious website. \n\n24) Some vulnerabilities are caused due to a bundled vulnerable\nversion of WebKit. \n\nFor more information:\nSA43519\nSA43683\nSA43696\nSA43859\nSA45097\nSA45325\nSA45325\nSA45498\nSA45498\nSA46339\nSA46412\n\n25) The WiFi credentials are stored in a file readable by other\napplications, which may lead to the credentials being disclosed. \n\nSuccessful exploitation of vulnerabilities #6, #16 \\x96 #20, and #24 may\nallow execution of arbitrary code. \n\nSOLUTION:\nApply iOS 5 Software Update. \n\nPROVIDED AND/OR DISCOVERED BY:\n1) Leszek Tasiemski, nSense. \n6, 9) Reported by the vendor. \n\nThe vendor credits:\n2) Rick Deacon\n3) Peter Quade, qdevelop\n4) Erling Ellingsen, Facebook. \n7) Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR)\n8) Bob Sielken, IBM\n14) Wouter van der Veer, Topicus and Josh Enders\n15) Thomas Clement, Intego\n17) Tobias Klein via iDefense. \n18) Tobias Klein, www.trapkit.de\n21) Christian Matthies via iDefense and Yoshinori Oota, Business\nArchitects via JP/CERT. \n22) An anonymous person\n23) Simon Young, Anglia Ruskin University\n25) Laurent OUDOT, TEHTRI Security\n\nORIGINAL ADVISORY:\nApple:\nhttp://support.apple.com/kb/HT4999\n\nnSense:\nhttp://www.nsense.fi/advisories/nsense_2011_006.txt\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. nSense Vulnerability Research Security Advisory NSENSE-2011-006\n ---------------------------------------------------------------\n t2\u002711 infosec conference special release\n http://www.t2.fi\n ---------------------------------------------------------------\n\n Affected Vendor: Apple Inc. \n Affected Product: CalDAV (iOS 3.0 through 4.3.5 for iPhone 3GS\n and iPhone 4, iOS 3.1 through 4.3.5 for iPod\n touch (3rd generation) and later, iOS 3.2\n through 4.3.5 for iPad)\n Platform: iOS\n Impact: Sensitive information interception\n Vendor response: New version released\n CVE: CVE-2011-3253\n Credit: Leszek / nSense\n Release date: 12 Oct 2011\n\n Technical details\n ---------------------------------------------------------------\n The calendar synchronization feature of iOS fails to validate\n the SSL certificate provided by the server. Therefore, CalDAV\n communication can be intercepted by a basic man in the middle\n attack. As every request contains a HTTP basic authentication\n header, which contains base64-encoded credentials, it is\n possible to intercept email account credentials by an attacker\n that is suitably positioned (e.g. the same LAN, WLAN) or is\n able to tamper with DNS records pointing to the CalDAV server. \n\t\n The application accepts the untrusted certificate without any\n warning or prompt, so the attack will go unnoticed by the user. \n\n Timeline:\n 20110407 nSense informed the vendor about the vulnerability\n 20110409 Vendor started to investigate the issue\n 20110415 nSense sent a status update request to the vendor\n 20110415 Vendor provided a status update\n 20110420 nSense asked the vendor for further information\n 20110502 nSense resent the previous questions\n 20110502 Vendor confirmed the vulnerability\n 20110525 nSense asked the vendor about the patch schedule\n 20110527 Vendor responded\n 20110527 nSense asked the vendor for further information\n 20110531 Vendor responded, unable to provide a date\n 20110601 nSense asked the vendor for clarification\n 20110603 Vendor responded\n 20110603 nSense resent the previous question\n 20110607 nSense commented the issue, asked the vendor for\n clarification\n 20110705 nSense asked the vendor for clarification\n 20110726 nSense asked the vendor whether 4.3.5 fixed the\n issue\n 20110727 Vendor responded. Issue not fixed. \n 20110728 nSense asked the vendor for further details\n 20110917 Vendor asked for credit information\n 20110917 nSense responded\n 20111002 Vendor confirmed release date\n 20111012 Vendor releases fixed version of the software\n 20111012 Vendor releases public advisory\n\n\t\n Solution:\n Apple security updates are available via the Software Update\n mechanism: http://support.apple.com/kb/HT1338\n\t\n Apple security updates are also available for manual download\n via: http://www.apple.com/support/downloads/\n\n More information from Apple Inc.:\n http://support.apple.com/kb/HT1222\n\t\n Links:\n http://www.nsense.fi http://www.nsense.dk\n\n\n\n $$s$$$$s. ,s$$$$s ,S$$$$$s. $$s$$$$s. ,s$$$$s ,S$$$$$s. \n $$$ `$$$ ($$( $$$ `$$$ $$$ `$$$ ($$( $$$ `$$$\n $$$ $$$ `^$$s. $$$$$$$$$ $$$ $$$ `^$$s. $$$$$$$$$\n $$$ $$$ )$$) $$$ $$$ $$$ )$$) $$$\n $$$ $$$ ^$$$$$$7 `7$$$$$P $$$ $$$ ^$$$$$$7 `7$$$$$P\n\n D r i v e n b y t h e c h a l l e n g e _\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n", "sources": [ { "db": "NVD", "id": "CVE-2011-3253" }, { "db": "JVNDB", "id": "JVNDB-2011-002462" }, { "db": "BID", "id": "50149" }, { "db": "VULHUB", "id": "VHN-51198" }, { "db": "PACKETSTORM", "id": "105765" }, { "db": "PACKETSTORM", "id": "105751" } ], "trust": 2.16 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-51198", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-51198" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-3253", "trust": 2.9 }, { "db": "JVNDB", "id": "JVNDB-2011-002462", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201110-330", "trust": 0.7 }, { "db": "SECUNIA", "id": "46377", "trust": 0.7 }, { "db": "APPLE", "id": "APPLE-SA-2011-10-12-1", "trust": 0.6 }, { "db": "BID", "id": "50149", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "105751", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-51198", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "105765", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-51198" }, { "db": "BID", "id": "50149" }, { "db": "JVNDB", "id": "JVNDB-2011-002462" }, { "db": "PACKETSTORM", "id": "105765" }, { "db": "PACKETSTORM", "id": "105751" }, { "db": "CNNVD", "id": "CNNVD-201110-330" }, { "db": "NVD", "id": "CVE-2011-3253" } ] }, "id": "VAR-201110-0318", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-51198" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:54:13.637000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4999", "trust": 0.8, "url": "http://support.apple.com/kb/HT4999" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002462" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-51198" }, { "db": "JVNDB", "id": "JVNDB-2011-002462" }, { "db": "NVD", "id": "CVE-2011-3253" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://support.apple.com/kb/ht4999" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2011//oct/msg00001.html" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3253" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu177979" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3253" }, { "trust": 0.6, "url": "http://secunia.com/advisories/46377" }, { "trust": 0.3, "url": "http://seclists.org/fulldisclosure/2011/oct/544" }, { "trust": 0.3, "url": "http://www.apple.com/ios/" }, { "trust": 0.1, "url": "https://www.trapkit.de" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46377/#comments" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://www.nsense.fi/advisories/nsense_2011_006.txt" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/vim/ovum_2011_request/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=46377" }, { "trust": 0.1, "url": "http://secunia.com/advisories/46377/" }, { "trust": 0.1, "url": "http://www.t2.fi" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://www.nsense.dk" }, { "trust": 0.1, "url": "http://www.nsense.fi" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3253" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1338" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-51198" }, { "db": "BID", "id": "50149" }, { "db": "JVNDB", "id": "JVNDB-2011-002462" }, { "db": "PACKETSTORM", "id": "105765" }, { "db": "PACKETSTORM", "id": "105751" }, { "db": "CNNVD", "id": "CNNVD-201110-330" }, { "db": "NVD", "id": "CVE-2011-3253" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-51198" }, { "db": "BID", "id": "50149" }, { "db": "JVNDB", "id": "JVNDB-2011-002462" }, { "db": "PACKETSTORM", "id": "105765" }, { "db": "PACKETSTORM", "id": "105751" }, { "db": "CNNVD", "id": "CNNVD-201110-330" }, { "db": "NVD", "id": "CVE-2011-3253" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-14T00:00:00", "db": "VULHUB", "id": "VHN-51198" }, { "date": "2011-10-12T00:00:00", "db": "BID", "id": "50149" }, { "date": "2011-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002462" }, { "date": "2011-10-13T09:15:38", "db": "PACKETSTORM", "id": "105765" }, { "date": "2011-10-13T03:07:54", "db": "PACKETSTORM", "id": "105751" }, { "date": "2011-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-330" }, { "date": "2011-10-14T10:55:09.887000", "db": "NVD", "id": "CVE-2011-3253" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-14T00:00:00", "db": "VULHUB", "id": "VHN-51198" }, { "date": "2011-10-12T00:00:00", "db": "BID", "id": "50149" }, { "date": "2011-10-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002462" }, { "date": "2011-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-330" }, { "date": "2024-11-21T01:30:06.823000", "db": "NVD", "id": "CVE-2011-3253" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201110-330" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple iOS of CalDAV Vulnerability in which important information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002462" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201110-330" } ], "trust": 0.6 } }
CERTA-2011-AVI-567
Vulnerability from certfr_avis
De nombreuses vulnérabilités ont été corrigées dans Apple iOS pour iPhone, iPad et iPod touch dont certaines permettent une exécution de code arbitraire à distance.
Description
De nombreuses vulnérabilités ont été corrigées dans Apple iOS pour iPhone, iPad et iPod touch. Certaines permettent à une personne malintentionnée d'exécuter du code arbitraire à distance ou de récupérer le mot de passe du compte «Apple ID» utilisé. Les composants suivants ont été mise à jour :
- CalDAV ;
- Calendar ;
- CFNetwork ;
- CoreFoundation ;
- CoreGraphics ;
- CoreMedia ;
- ImageIO ;
- International Components for Unicode ;
- Kernel ;
- Keyboards ;
- libxml ;
- OfficeImport ;
- Safari ;
- Settings ;
- UIKit ;
- WebKit ;
- WiFi.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "iPod touch avec iOS versions 4.3.5 et ant\u00e9rieures.", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iPhone 4 et 3GS avec iOS versions 4.3.5 et ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iPad avec iOS versions 4.3.5 et ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Apple iOS pour\niPhone, iPad et iPod touch. Certaines permettent \u00e0 une personne\nmalintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance ou de r\u00e9cup\u00e9rer\nle mot de passe du compte \u00abApple ID\u00bb utilis\u00e9. Les composants suivants\nont \u00e9t\u00e9 mise \u00e0 jour\u00a0:\n\n- CalDAV\u00a0;\n- Calendar\u00a0;\n- CFNetwork\u00a0;\n- CoreFoundation\u00a0;\n- CoreGraphics\u00a0;\n- CoreMedia\u00a0;\n- ImageIO\u00a0;\n- International Components for Unicode\u00a0;\n- Kernel\u00a0;\n- Keyboards\u00a0;\n- libxml\u00a0;\n- OfficeImport\u00a0;\n- Safari\u00a0;\n- Settings\u00a0;\n- UIKit\u00a0;\n- WebKit\u00a0;\n- WiFi.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2011-1204", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1204" }, { "name": "CVE-2011-1117", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1117" }, { "name": "CVE-2011-0187", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0187" }, { "name": "CVE-2011-0983", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0983" }, { "name": "CVE-2011-0259", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0259" }, { "name": "CVE-2011-2814", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2814" }, { "name": "CVE-2011-0208", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0208" }, { "name": "CVE-2011-0192", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0192" }, { "name": "CVE-2011-2823", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2823" }, { "name": "CVE-2011-2813", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2813" }, { "name": "CVE-2011-2359", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2359" }, { "name": "CVE-2011-0216", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0216" }, { "name": "CVE-2011-2788", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2788" }, { "name": "CVE-2011-1774", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1774" }, { "name": "CVE-2011-2819", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2819" }, { "name": "CVE-2011-2799", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2799" }, { "name": "CVE-2011-2341", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2341" }, { "name": "CVE-2011-0255", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0255" }, { "name": "CVE-2011-1190", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1190" }, { "name": "CVE-2011-3256", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3256" }, { "name": "CVE-2011-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1188" }, { "name": "CVE-2011-0233", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0233" }, { "name": "CVE-2011-1115", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1115" }, { "name": "CVE-2011-1296", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1296" }, { "name": "CVE-2011-2351", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2351" }, { "name": "CVE-2011-2827", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2827" }, { "name": "CVE-2011-3432", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3432" }, { "name": "CVE-2011-0981", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0981" }, { "name": "CVE-2011-3254", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3254" }, { "name": "CVE-2011-0254", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0254" }, { "name": "CVE-2011-2831", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2831" }, { "name": "CVE-2011-0238", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0238" }, { "name": "CVE-2011-2800", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2800" }, { "name": "CVE-2011-1295", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1295" }, { "name": "CVE-2011-3434", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3434" }, { "name": "CVE-2011-0222", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0222" }, { "name": "CVE-2011-1121", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1121" }, { "name": "CVE-2011-1797", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1797" }, { "name": "CVE-2011-2817", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2817" }, { "name": "CVE-2011-0206", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0206" }, { "name": "CVE-2011-1451", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1451" }, { "name": "CVE-2011-2790", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2790" }, { "name": "CVE-2011-3243", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3243" }, { "name": "CVE-2011-3235", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3235" }, { "name": "CVE-2011-3237", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3237" }, { "name": "CVE-2011-3255", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3255" }, { "name": "CVE-2011-2805", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2805" }, { "name": "CVE-2011-0232", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0232" }, { "name": "CVE-2011-2356", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2356" }, { "name": "CVE-2011-3246", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3246" }, { "name": "CVE-2011-2797", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2797" }, { "name": "CVE-2011-2339", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2339" }, { "name": "CVE-2011-1288", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1288" }, { "name": "CVE-2011-1132", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1132" }, { "name": "CVE-2011-0241", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0241" }, { "name": "CVE-2011-1203", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1203" }, { "name": "CVE-2011-3245", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3245" }, { "name": "CVE-2011-0242", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0242" }, { "name": "CVE-2011-2809", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2809" }, { "name": "CVE-2011-3261", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3261" }, { "name": "CVE-2011-1293", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1293" }, { "name": "CVE-2011-3234", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3234" }, { "name": "CVE-2011-2338", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2338" }, { "name": "CVE-2011-3429", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3429" }, { "name": "CVE-2011-0184", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0184" }, { "name": "CVE-2011-3431", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3431" }, { "name": "CVE-2011-2792", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2792" }, { "name": "CVE-2011-0234", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0234" }, { "name": "CVE-2011-1449", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1449" }, { "name": "CVE-2011-3430", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3430" }, { "name": "CVE-2011-3259", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3259" }, { "name": "CVE-2011-2818", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2818" }, { "name": "CVE-2011-1457", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1457" }, { "name": "CVE-2011-0235", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0235" }, { "name": "CVE-2011-0225", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0225" }, { "name": "CVE-2011-3236", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3236" }, { "name": "CVE-2011-1114", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1114" }, { "name": "CVE-2011-3427", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3427" }, { "name": "CVE-2011-0166", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0166" }, { "name": "CVE-2011-2820", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2820" }, { "name": "CVE-2011-1109", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1109" }, { "name": "CVE-2011-0221", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0221" }, { "name": "CVE-2011-2354", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2354" }, { "name": "CVE-2011-2816", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2816" }, { "name": "CVE-2011-2352", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2352" }, { "name": "CVE-2011-1462", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1462" }, { "name": "CVE-2011-1453", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1453" }, { "name": "CVE-2011-0218", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0218" }, { "name": "CVE-2011-3257", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3257" }, { "name": "CVE-2011-3244", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3244" }, { "name": "CVE-2011-1107", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1107" }, { "name": "CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "name": "CVE-2011-3426", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3426" }, { "name": "CVE-2011-3260", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3260" }, { "name": "CVE-2011-3232", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3232" }, { "name": "CVE-2011-3253", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3253" } ], "initial_release_date": "2011-10-13T00:00:00", "last_revision_date": "2011-10-13T00:00:00", "links": [], "reference": "CERTA-2011-AVI-567", "revisions": [ { "description": "version initiale.", "revision_date": "2011-10-13T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Apple iOS pour\niPhone, iPad et iPod touch dont certaines permettent une ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9s dans Apple iOS", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT4999 du 12 octobre 2011", "url": "http://support.apple.com/kb/HT4999" } ] }
fkie_cve-2011-3253
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
product-security@apple.com | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html | Vendor Advisory | |
product-security@apple.com | http://support.apple.com/kb/HT4999 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT4999 | Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
apple | iphone_os | 3.0 | |
apple | iphone_os | 3.1 | |
apple | iphone_os | 3.1 | |
apple | iphone_os | 3.1 | |
apple | iphone_os | 3.1.2 | |
apple | iphone_os | 3.1.3 | |
apple | iphone_os | 3.2 | |
apple | iphone_os | 3.2 | |
apple | iphone_os | 3.2.1 | |
apple | iphone_os | 3.2.1 | |
apple | iphone_os | 3.2.2 | |
apple | iphone_os | 4.0 | |
apple | iphone_os | 4.0 | |
apple | iphone_os | 4.0 | |
apple | iphone_os | 4.0.1 | |
apple | iphone_os | 4.0.1 | |
apple | iphone_os | 4.0.1 | |
apple | iphone_os | 4.0.2 | |
apple | iphone_os | 4.1 | |
apple | iphone_os | 4.2.1 | |
apple | iphone_os | 4.2.5 | |
apple | iphone_os | 4.2.8 | |
apple | iphone_os | 4.3.0 | |
apple | iphone_os | 4.3.1 | |
apple | iphone_os | 4.3.2 | |
apple | iphone_os | 4.3.3 | |
apple | iphone_os | 4.3.5 | |
apple | iphone_os | 4.3.5 | |
apple | iphone_os | 4.3.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*", "matchCriteriaId": "A066B59B-D5C8-4AA8-9CC7-5D34F4AB88AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "51D3BE2B-5A01-4AD4-A436-0056B50A535D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "E357722F-4976-4E47-BFB5-709480BAE267", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "F43A6FEC-ECA9-44A4-AD00-FDC6F3990DC0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "7CA92907-90C9-4BD6-8EE8-8FA6298C3D0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*", "matchCriteriaId": "220590DA-2B6A-4FC9-B456-3053EED9D96E", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*", "matchCriteriaId": "3FE3CDE8-6497-445E-A845-8A1C2A4EDEB1", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "9E4D3134-28BC-4C30-A9B0-559338FBBDFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "3A939B80-0AD0-48AF-81A7-370716F56639", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*", "matchCriteriaId": "98C41674-370B-4CF0-817B-3843D93A10DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D28528CE-4943-4F82-80C0-A629DA3E6702", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "12E22AF0-2B66-425A-A1EE-4F0E3B0433E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0:-:iphone:*:*:*:*:*", "matchCriteriaId": "954CDDCB-AC22-448D-8ECA-CFA4DBA1BC27", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "54FECD66-4216-43FC-9959-B8EA9545449C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BB34ECBE-33E8-40E1-936B-7800D2525AE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0.1:-:iphone:*:*:*:*:*", "matchCriteriaId": "ECE983F6-A597-4581-A254-80396B54F2D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0.1:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "586C0CB3-98E5-4CB3-8F23-27F01233D6C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "107C59BE-D8CF-4A17-8DFB-BED2AB12388D", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "36C86BB9-0328-4E34-BC2B-47B3471EC262", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "A54A8681-2D8A-4B0B-A947-82F3CE1FB03C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "E0070D83-2E27-4DA8-8D10-A6A697216F36", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "8C9ACA63-4528-4090-B1EA-1FE57A6B0555", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7252935C-E421-4339-B61F-0299E28888DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "9DD342BF-096A-4082-B700-19629F2BDE87", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "93141AB6-26F2-4C6D-95B3-D383EABB4034", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "4D5C61FF-7CD3-410A-94F2-5DE701466B1F", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "28A01C87-B02A-4239-8340-B396D0E6B21C", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*", "matchCriteriaId": "396634C5-774C-4131-B927-3CAD239EF0B3", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*", "matchCriteriaId": "64FF0F29-B3C2-4BDC-89FF-DBEDE87D64A4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate." }, { "lang": "es", "value": "CalDAV en Apple iOS antes de v5 no valida los certificados X.509 para las sesiones de SSL, lo que permite a atacantes de tipo hombre-en-el-medio (\"man-in-the-middle\") falsificar los servidores de calendario y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado de su elecci\u00f3n." } ], "id": "CVE-2011-3253", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-10-14T10:55:09.887", "references": [ { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT4999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT4999" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ghsa-frpq-wjg3-5rp5
Vulnerability from github
CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate.
{ "affected": [], "aliases": [ "CVE-2011-3253" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-10-14T10:55:00Z", "severity": "LOW" }, "details": "CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate.", "id": "GHSA-frpq-wjg3-5rp5", "modified": "2022-05-17T05:37:44Z", "published": "2022-05-17T05:37:44Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3253" }, { "type": "WEB", "url": "http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT4999" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.