Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-0642 (GCVE-0-2012-0642)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:30:53.785Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1026774", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026774" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "48288", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48288" }, { "name": "APPLE-SA-2012-03-07-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T18:57:02", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "name": "1026774", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026774" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "48288", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48288" }, { "name": "APPLE-SA-2012-03-07-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2012-0642", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1026774", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026774" }, { "name": "http://support.apple.com/kb/HT5281", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "48288", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48288" }, { "name": "APPLE-SA-2012-03-07-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2012-0642", "datePublished": "2012-03-08T22:00:00", "dateReserved": "2012-01-12T00:00:00", "dateUpdated": "2024-08-06T18:30:53.785Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-0642\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2012-03-08T22:55:04.137\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image.\"},{\"lang\":\"es\",\"value\":\"Un desbordamiento de entero en Apple iOS antes de v5.1 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (ca\u00edda del dispositivo) a trav\u00e9s de un archivo de cat\u00e1logo modificado en una imagen de disco HFS.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.1\",\"matchCriteriaId\":\"4B150860-FC76-4DDC-9FEE-BC5D96D08751\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48288\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1026774\",\"source\":\"product-security@apple.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/May/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT5281\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1026774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
CERTA-2012-AVI-127
Vulnerability from certfr_avis
De multiples vulnérabilités, permettant notamment l'exécution de code arbitraire à distance, ont été corrigées dans Apple iOS.
Description
De multiples vulnérabilités ont été corrigées dans Apple iOS. Ces vulnérabilités peuvent notamment être utilisées par une personne malintentionnée pour provoquer l'exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "iPhone 3GS, 4 et 4S avec iOS versions ant\u00e9rieures \u00e0 5.1 ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iPod 3\u00e8me g\u00e9n\u00e9ration avec iOS versions ant\u00e9rieurs \u00e0 5.1 ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iPad 1 et 2 avec iOS versions ant\u00e9rieures \u00e0 5.1.", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Apple iOS. Ces\nvuln\u00e9rabilit\u00e9s peuvent notamment \u00eatre utilis\u00e9es par une personne\nmalintentionn\u00e9e pour provoquer l\u0027ex\u00e9cution de code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-0602", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0602" }, { "name": "CVE-2012-0589", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0589" }, { "name": "CVE-2012-0597", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0597" }, { "name": "CVE-2011-2860", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2860" }, { "name": "CVE-2011-2855", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2855" }, { "name": "CVE-2012-0628", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0628" }, { "name": "CVE-2012-0623", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0623" }, { "name": "CVE-2012-0588", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0588" }, { "name": "CVE-2012-0607", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0607" }, { "name": "CVE-2011-2867", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2867" }, { "name": "CVE-2012-0613", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0613" }, { "name": "CVE-2011-2847", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2847" }, { "name": "CVE-2012-0630", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0630" }, { "name": "CVE-2012-0587", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0587" }, { "name": "CVE-2011-2825", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2825" }, { "name": "CVE-2012-0586", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0586" }, { "name": "CVE-2011-2846", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2846" }, { "name": "CVE-2011-3453", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3453" }, { "name": "CVE-2012-0608", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0608" }, { "name": "CVE-2012-0590", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0590" }, { "name": "CVE-2012-0606", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0606" }, { "name": "CVE-2012-0633", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0633" }, { "name": "CVE-2011-3885", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3885" }, { "name": "CVE-2012-0595", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0595" }, { "name": "CVE-2012-0596", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0596" }, { "name": "CVE-2012-0627", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0627" }, { "name": "CVE-2012-0626", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0626" }, { "name": "CVE-2012-0593", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0593" }, { "name": "CVE-2012-0617", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0617" }, { "name": "CVE-2012-0644", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0644" }, { "name": "CVE-2012-0592", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0592" }, { "name": "CVE-2011-2873", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2873" }, { "name": "CVE-2012-0585", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0585" }, { "name": "CVE-2012-0611", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0611" }, { "name": "CVE-2012-0612", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0612" }, { "name": "CVE-2012-0599", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0599" }, { "name": "CVE-2012-0601", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0601" }, { "name": "CVE-2011-3928", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3928" }, { "name": "CVE-2012-0614", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0614" }, { "name": "CVE-2012-0643", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0643" }, { "name": "CVE-2012-0616", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0616" }, { "name": "CVE-2012-0609", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0609" }, { "name": "CVE-2012-0621", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0621" }, { "name": "CVE-2012-0631", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0631" }, { "name": "CVE-2012-0600", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0600" }, { "name": "CVE-2011-2857", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2857" }, { "name": "CVE-2011-2868", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2868" }, { "name": "CVE-2011-3909", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3909" }, { "name": "CVE-2012-0618", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0618" }, { "name": "CVE-2012-0622", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0622" }, { "name": "CVE-2011-2869", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2869" }, { "name": "CVE-2012-0624", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0624" }, { "name": "CVE-2012-0604", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0604" }, { "name": "CVE-2012-0620", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0620" }, { "name": "CVE-2012-0603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0603" }, { "name": "CVE-2011-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3888" }, { "name": "CVE-2012-0629", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0629" }, { "name": "CVE-2011-2854", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2854" }, { "name": "CVE-2012-0610", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0610" }, { "name": "CVE-2012-0632", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0632" }, { "name": "CVE-2012-0642", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0642" }, { "name": "CVE-2012-0646", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0646" }, { "name": "CVE-2012-0619", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0619" }, { "name": "CVE-2011-2870", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2870" }, { "name": "CVE-2012-0641", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0641" }, { "name": "CVE-2011-2833", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2833" }, { "name": "CVE-2012-0645", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0645" }, { "name": "CVE-2012-0594", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0594" }, { "name": "CVE-2011-3908", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3908" }, { "name": "CVE-2012-0625", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0625" }, { "name": "CVE-2012-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0605" }, { "name": "CVE-2011-2871", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2871" }, { "name": "CVE-2012-0635", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0635" }, { "name": "CVE-2012-0615", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0615" }, { "name": "CVE-2012-0591", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0591" }, { "name": "CVE-2011-3897", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3897" }, { "name": "CVE-2012-0598", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0598" }, { "name": "CVE-2011-2877", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2877" }, { "name": "CVE-2011-2872", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2872" }, { "name": "CVE-2011-3887", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3887" }, { "name": "CVE-2011-3881", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3881" } ], "initial_release_date": "2012-03-09T00:00:00", "last_revision_date": "2012-03-09T00:00:00", "links": [], "reference": "CERTA-2012-AVI-127", "revisions": [ { "description": "version initiale.", "revision_date": "2012-03-09T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s, permettant notamment l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance, ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eApple\niOS\u003c/span\u003e.\n", "title": "Vuln\u00e9rabilit\u00e9s dans Apple iOS", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple du 07 mars 2012", "url": "http://support.apple.com/kb/HT1222" } ] }
CERTA-2012-AVI-272
Vulnerability from certfr_avis
Trente-six vulnérabilités ont été corrigées dans OS X Lion. Il est possible d'exécuter du code arbitraire à distance, d'exécuter du code en local, d'obtenir des données sensibles et d'élever ses privilèges. De nombreuses applications et fonctions sont touchées, toutes sont décrites dans le bulletin Apple référencé dans la section « Documentation ».
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Versions antérieures à OS X Lion v10.7.4.
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cP\u003eVersions ant\u00e9rieures \u00e0 OS X Lion v10.7.4.\u003c/P\u003e", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2011-1167", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1167" }, { "name": "CVE-2012-0675", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0675" }, { "name": "CVE-2012-0649", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0649" }, { "name": "CVE-2012-0661", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0661" }, { "name": "CVE-2012-0658", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0658" }, { "name": "CVE-2011-4815", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4815" }, { "name": "CVE-2011-2692", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2692" }, { "name": "CVE-2011-1944", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1944" }, { "name": "CVE-2011-3328", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3328" }, { "name": "CVE-2012-0659", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0659" }, { "name": "CVE-2011-3212", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3212" }, { "name": "CVE-2011-2834", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2834" }, { "name": "CVE-2011-2821", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2821" }, { "name": "CVE-2012-0657", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0657" }, { "name": "CVE-2012-0652", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0652" }, { "name": "CVE-2011-1778", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1778" }, { "name": "CVE-2011-0241", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0241" }, { "name": "CVE-2012-0660", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0660" }, { "name": "CVE-2011-1005", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1005" }, { "name": "CVE-2012-0036", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0036" }, { "name": "CVE-2012-0662", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0662" }, { "name": "CVE-2012-0655", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0655" }, { "name": "CVE-2012-0642", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0642" }, { "name": "CVE-2011-4566", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4566" }, { "name": "CVE-2011-1777", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1777" }, { "name": "CVE-2011-4885", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4885" }, { "name": "CVE-2011-2895", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2895" }, { "name": "CVE-2012-0651", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0651" }, { "name": "CVE-2011-1004", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1004" }, { "name": "CVE-2012-0830", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0830" }, { "name": "CVE-2011-3919", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3919" }, { "name": "CVE-2012-0656", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0656" }, { "name": "CVE-2011-3389", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3389" }, { "name": "CVE-2012-1182", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1182" }, { "name": "CVE-2012-0870", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0870" }, { "name": "CVE-2012-0654", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0654" } ], "initial_release_date": "2012-05-10T00:00:00", "last_revision_date": "2012-05-10T00:00:00", "links": [], "reference": "CERTA-2012-AVI-272", "revisions": [ { "description": "version initiale.", "revision_date": "2012-05-10T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "Trente-six vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eOS\nX Lion\u003c/span\u003e. Il est possible d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance,\nd\u0027ex\u00e9cuter du code en local, d\u0027obtenir des donn\u00e9es sensibles et d\u0027\u00e9lever\nses privil\u00e8ges. De nombreuses applications et fonctions sont touch\u00e9es,\ntoutes sont d\u00e9crites dans le bulletin \u003cspan class=\"textit\"\u003eApple\u003c/span\u003e\nr\u00e9f\u00e9renc\u00e9 dans la section \u00ab Documentation \u00bb.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans OS X Lion", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT5281 du 09 mai 2012", "url": "https://support.apple.com/kb/HT5281" } ] }
ghsa-r486-q6j7-vv34
Vulnerability from github
Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image.
{ "affected": [], "aliases": [ "CVE-2012-0642" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-03-08T22:55:00Z", "severity": "HIGH" }, "details": "Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image.", "id": "GHSA-r486-q6j7-vv34", "modified": "2022-05-14T01:54:56Z", "published": "2022-05-14T01:54:56Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0642" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/48288" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5281" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1026774" } ], "schema_version": "1.4.0", "severity": [] }
fkie_cve-2012-0642
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
product-security@apple.com | http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html | Mailing List, Vendor Advisory | |
product-security@apple.com | http://lists.apple.com/archives/security-announce/2012/May/msg00001.html | Mailing List, Vendor Advisory | |
product-security@apple.com | http://secunia.com/advisories/48288 | Third Party Advisory | |
product-security@apple.com | http://support.apple.com/kb/HT5281 | Vendor Advisory | |
product-security@apple.com | http://www.securitytracker.com/id?1026774 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/May/msg00001.html | Mailing List, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48288 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT5281 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026774 | Third Party Advisory, VDB Entry |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B150860-FC76-4DDC-9FEE-BC5D96D08751", "versionEndExcluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image." }, { "lang": "es", "value": "Un desbordamiento de entero en Apple iOS antes de v5.1 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (ca\u00edda del dispositivo) a trav\u00e9s de un archivo de cat\u00e1logo modificado en una imagen de disco HFS." } ], "id": "CVE-2012-0642", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-03-08T22:55:04.137", "references": [ { "source": "product-security@apple.com", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" }, { "source": "product-security@apple.com", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "source": "product-security@apple.com", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48288" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5281" }, { "source": "product-security@apple.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1026774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1026774" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2012-0642
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2012-0642", "description": "Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image.", "id": "GSD-2012-0642" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-0642" ], "details": "Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image.", "id": "GSD-2012-0642", "modified": "2023-12-13T01:20:14.415574Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2012-0642", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1026774", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026774" }, { "name": "http://support.apple.com/kb/HT5281", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "48288", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48288" }, { "name": "APPLE-SA-2012-03-07-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2012-0642" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-189" } ] } ] }, "references": { "reference_data": [ { "name": "APPLE-SA-2012-03-07-2", "refsource": "APPLE", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" }, { "name": "http://support.apple.com/kb/HT5281", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://support.apple.com/kb/HT5281" }, { "name": "APPLE-SA-2012-05-09-1", "refsource": "APPLE", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html" }, { "name": "1026774", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1026774" }, { "name": "48288", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48288" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": true } }, "lastModifiedDate": "2018-11-29T19:09Z", "publishedDate": "2012-03-08T22:55Z" } } }
var-201203-0105
Vulnerability from variot
Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image. Apple iOS for iPhone, iPod touch, and iPad is prone to multiple security vulnerabilities. These issues affect the following components: CFNetwork HFS Kernel Passcode Lock Safari Siri VPN Successfully exploiting these issues may allow attackers to crash the affected device, bypass security restrictions, obtain sensitive information, or execute arbitrary code. Other attacks are also possible. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. An integer underflow vulnerability exists in Apple iOS versions prior to 5.1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2012-05-09-1 OS X Lion v10.7.4 and Security Update 2012-002
OS X Lion v10.7.4 and Security Update 2012-002 is now available and addresses the following:
Login Window Available for: OS X Lion v10.7.3, OS X Lion Server v10.7.3 Impact: Remote admins and persons with physical access to the system may obtain account information Description: An issue existed in the handling of network account logins. The login process recorded sensitive information in the system log, where other users of the system could read it. The sensitive information may persist in saved logs after installation of this update. See http://support.apple.com/kb/TS4272 for more information on how to securely remove any remaining records. This issue only affects systems running OS X Lion v10.7.3 with users of Legacy File Vault and/or networked home directories. CVE-ID CVE-2012-0652 : Terry Reeves and Tim Winningham of the Ohio State University, Markus 'Jaroneko' Raty of the Finnish Academy of Fine Arts, Jaakko Pero of Aalto University, Mark Cohen of Oregon State University, Paul Nelson
Bluetooth Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: A local user may be able to execute arbitrary code with system privileges Description: A temporary file race condition issue existed in blued's initialization routine. CVE-ID CVE-2012-0649 : Aaron Sigel of vtty.com
curl Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: An attacker may be able to decrypt data protected by SSL Description: There are known attacks on the confidentiality of SSL 3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. curl disabled the 'empty fragment' countermeasure which prevented these attacks. This issue is addressed by enabling empty fragments. CVE-ID CVE-2011-3389 : Apple
curl Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Using curl or libcurl with a maliciously crafted URL may lead to protocol-specific data injection attacks Description: A data injection issue existed in curl's handling of URLs. This issue is addressed through improved validation of URLs. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2012-0036
Directory Service Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8 Impact: A remote attacker may obtain sensitive information Description: Multiple issues existed in the directory server's handling of messages from the network. By sending a maliciously crafted message, a remote attacker could cause the directory server to disclose memory from its address space, potentially revealing account credentials or other sensitive information. This issue does not affect OS X Lion systems. The Directory Server is disabled by default in non-server installations of OS X. This issue does not affect OS X Lion systems. CVE-ID CVE-2011-0241 : Cyril CATTIAUX of Tessi Technologies
ImageIO Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8 Impact: Multiple vulnerabilities in libpng Description: libpng is updated to version 1.5.5 to address multiple vulnerabilities, the most serious of which may lead to information disclosure. Further information is available via the libpng website at http://www.libpng.org/pub/png/libpng.html CVE-ID CVE-2011-2692 CVE-2011-3328
ImageIO Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8 Impact: Viewing a maliciously crafted TIFF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in libtiff's handling of ThunderScan encoded TIFF images. This issue is addressed by updating libtiff to version 3.9.5. CVE-ID CVE-2011-1167
Kernel Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: When FileVault is used, the disk may contain unencrypted user data Description: An issue in the kernel's handling of the sleep image used for hibernation left some data unencrypted on disk even when FileVault was enabled. This issue is addressed through improved handling of the sleep image, and by overwriting the existing sleep image when updating to OS X v10.7.4. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2011-3212 : Felix Groebert of Google Security Team
libarchive Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Extracting a maliciously crafted archive may lead to an unexpected application termination or arbitrary code execution Description: Multiple buffer overflows existed in the handling of tar archives and iso9660 files. CVE-ID CVE-2011-1777 CVE-2011-1778
libsecurity Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Verifying a maliciously crafted X.509 certificate, such as when visiting a maliciously crafted website, may lead to an unexpected application termination or arbitrary code execution Description: An uninitialized memory access issue existed in the handling of X.509 certificates. CVE-ID CVE-2012-0654 : Dirk-Willem van Gulik of WebWeaving.org, Guilherme Prado of Conselho da Justica Federal, Ryan Sleevi of Google
libsecurity Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Support for X.509 certificates with insecure-length RSA keys may expose users to spoofing and information disclosure Description: Certificates signed using RSA keys with insecure key lengths were accepted by libsecurity. This issue is addressed by rejecting certificates containing RSA keys less than 1024 bits. CVE-ID CVE-2012-0655
libxml Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution Description: Multiple vulnerabilities existed in libxml, the most serious of which may lead to an unexpected application termination or arbitrary code execution. These issues are addressed by applying the relevant upstream patches. CVE-ID CVE-2011-1944 : Chris Evans of Google Chrome Security Team CVE-2011-2821 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences CVE-2011-2834 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences CVE-2011-3919 : Juri Aedla
LoginUIFramework Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: If the Guest user is enabled, a user with physical access to the computer may be able to log in to a user other than the Guest user without entering a password Description: A race condition existed in the handling of Guest user logins. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2012-0656 : Francisco Gomez (espectalll123)
PHP Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Multiple vulnerabilities in PHP Description: PHP is updated to version 5.3.10 to address several vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP web site at http://www.php.net CVE-ID CVE-2011-4566 CVE-2011-4885 CVE-2012-0830
Quartz Composer Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: A user with physical access to the computer may be able to cause Safari to launch if the screen is locked and the RSS Visualizer screen saver is used Description: An access control issue existed in Quartz Composer's handling of screen savers. This issue is addressed through improved checking for whether or not the screen is locked. CVE-ID CVE-2012-0657 : Aaron Sigel of vtty.com
QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Viewing a maliciously crafted movie file during progressive download may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of audio sample tables. CVE-ID CVE-2012-0658 : Luigi Auriemma working with HP's Zero Day Initiative
QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Viewing a maliciously crafted MPEG file may lead to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of MPEG files. CVE-ID CVE-2012-0659 : An anonymous researcher working with HP's Zero Day Initiative
QuickTime Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Viewing a maliciously crafted MPEG file may lead to an unexpected application termination or arbitrary code execution Description: A buffer underflow existed in the handling of MPEG files. CVE-ID CVE-2012-0660 : Justin Kim at Microsoft and Microsoft Vulnerability Research
QuickTime Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A use after free issue existed in the handling of JPEG2000 encoded movie files. This issue does not affect systems prior to OS X Lion. CVE-ID CVE-2012-0661 : Damian Put working with HP's Zero Day Initiative
Ruby Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Multiple vulnerabilities in Ruby Description: Ruby is updated to 1.8.7-p357 to address multiple vulnerabilities. These issues do not affect OS X Lion systems. CVE-ID CVE-2012-0870 : Andy Davis of NGS Secure CVE-2012-1182 : An anonymous researcher working with HP's Zero Day Initiative
Security Framework Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8, OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: A remote attacker may cause an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the Security framework. Processing untrusted input with the Security framework could result in memory corruption. This issue does not affect 32-bit processes. CVE-ID CVE-2012-0662 : aazubel working with HP's Zero Day Initiative
Time Machine Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: A remote attacker may access a user's Time Machine backup credentials Description: The user may designate a Time Capsule or remote AFP volume attached to an AirPort Base Station to be used for Time Machine backups. Beginning with AirPort Base Station and Time Capsule Firmware Update 7.6, Time Capsules and Base Stations support a secure SRP-based authentication mechanism over AFP. However, Time Machine did not require that the SRP-based authentication mechanism was used for subsequent backup operations, even if Time Machine was initially configured or had ever contacted a Time Capsule or Base Station that supported it. An attacker who is able to spoof the remote volume could gain access to user's Time Capsule credentials, although not backup data, sent by the user's system. This issue is addressed by requiring use of the SRP-based authentication mechanism if the backup destination has ever supported it. CVE-ID CVE-2012-0675 : Renaud Deraison of Tenable Network Security, Inc.
X11 Available for: OS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3 Impact: Applications that use libXfont to process LZW-compressed data may be vulnerable to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in libXfont's handling of LZW-compressed data. This issue is addressed by updating libXfont to version 1.4.4. CVE-ID CVE-2011-2895 : Tomas Hoger of Red Hat
Note: Additionally, this update filters dynamic linker environment variables from a customized environment property list in the user's home directory, if present.
OS X Lion v10.7.4 and Security Update 2012-002 may be obtained from the Software Update pane in System Preferences, or Apple's Software Downloads web site: http://www.apple.com/support/downloads/
The Software Update utility will present the update that applies to your system configuration. Only one is needed, either Security Update 2012-002 or OS X v10.7.4.
For OS X Lion v10.7.3 The download file is named: MacOSXUpd10.7.4.dmg Its SHA-1 digest is: 04c53a6148ebd8c5733459620b7c1e2172352d36
For OS X Lion v10.7 and v10.7.2 The download file is named: MacOSXUpdCombo10.7.4.dmg Its SHA-1 digest is: b11d511a50d9b728532688768fcdee9c1930037f
For OS X Lion Server v10.7.3 The download file is named: MacOSXServerUpd10.7.4.dmg Its SHA-1 digest is: 3cb5699c8ecf7d70145f3692555557f7206618b2
For OS X Lion Server v10.7 and v10.7.2 The download file is named: MacOSXServerUpdCombo10.7.4.dmg Its SHA-1 digest is: 917207e922056718b9924ef73caa5fcac06b7240
For Mac OS X v10.6.8 The download file is named: SecUpd2012-002Snow.dmg Its SHA-1 digest is: 9669fbd9952419e70ac20109cf4db37f9932e9f8
For Mac OS X Server v10.6.8 The download file is named: SecUpdSrvr2012-002.dmg Its SHA-1 digest is: 34da2dcbc8d45362f1d5e3b1b218112a729ae1c3
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin)
iQEcBAEBAgAGBQJPqtkzAAoJEGnF2JsdZQeee2MIAKAcBIY6k0LU2fDLThFoAgKh WkYpGmCwa7L6n02geHzWrUCK/P/0yGWzDDqLfKlKuKbXdEIRP2wZTlvrqZHLzNO/ nXgz3HN1Xbll8yVXrGMEsoTD23Q+2/ZKLGMlSDw3vgBTVi/g4Rcer4Eew5mTkaoA j4WkrzgVUIxCMrsWMMwu1SVaizBuTYbNVzCzV3JPF1H0zVtVKgwWjhTdOJ/RDksD sjZG1XIEqVyv1rNk5BtjxVPFaJGpf9mcHiH8XyKQ0bC6ToM2r3B++Layoc5k1K0V OxKGSfWOEbWi/KR6vlXyVbe7JnU7a/V0C25HXhnoMEtoTCleZACEByLVtBC87LU= =6Eiz -----END PGP SIGNATURE----- . ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Apple iOS Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA48288
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48288/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48288
RELEASE DATE: 2012-03-09
DISCUSS ADVISORY: http://secunia.com/advisories/48288/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/48288/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48288
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A weakness and multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to bypass certain security restrictions and by malicious people to disclose sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's device.
1) An error within the CFNetwork component when handling URLs can be exploited to disclose sensitive information by tricking the user into visiting a malicious website.
3) A logic error within the kernel does not properly handle debug system calls and can be exploited to bypass the sandbox restrictions.
4) An integer overflow error within the libresolv library when handling DNS resource records can be exploited to corrupt heap memory.
For more information see vulnerability #21 in: SA47843
5) A race condition error in the Passcode Lock component when handling slide to dial gestures can be exploited to bypass the Passcode Lock screen.
6) The weakness is caused due to the Private Browsing mode in Safari not properly preventing recording of visits to certain sites using the pushState or replaceState JavaScript methods.
7) An error within the Siri component when handling voice commands can be exploited to bypass the screen lock and forward an open mail message to an arbitrary recipient.
8) A format string error in the VPN component when handling racoon configuration files can be exploited to execute arbitrary code via a specially crafted racoon configuration file.
9) A cross-origin error in the WebKit component can be exploited to bypass the same-origin policy and disclose a cookie by tricking the user into visiting a malicious website.
10) An error within the WebKit component when handling drag-and-drop actions can be exploited to conduct cross-site scripting attacks.
11) Multiple unspecified errors within the WebKit component can be exploited to conduct cross-site scripting attacks.
12) Some vulnerabilities are caused due to a bundled vulnerable version of WebKit.
For more information: SA45698 SA46049 SA46308 SA46594 SA46815 SA47231 SA47694
Successful exploitation of vulnerabilities #2, #4, #8, and #12 may allow execution of arbitrary code.
PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Erling Ellingsen, Facebook. 2, 8) pod2g. 3) 2012 iOS Jailbreak Dream Team. 5) Roland Kohler, the German Federal Ministry of Economics and Technology. 6) Eric Melville, American Express. 9) Sergey Glazunov. 10) Adam Barth, Google Chrome Security Team. 11) Sergey Glazunov, Jochen Eisinger of Google Chrome Team, Alan Austin of polyvore.com.
ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT5192
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201203-0105", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "5.1" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.3" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.3" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "5.1 (ipad and ipad 2)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "5.1 (iphone 3gs)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "5.1 (iphone 4)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "5.1 (iphone 4s)" }, { "model": "ios", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "5.1 (ipod touch (3rd generation) or later )" }, { "model": "ipad", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "iphone", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.3.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "5.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "5.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.6" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.5" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.3" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.3" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.6" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.5" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.3" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.8" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.5" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "iphone ipodtouch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1-" }, { "model": "iphone iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1-" }, { "model": "iphone ipodtouch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0-" }, { "model": "iphone iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0-" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "iphone ipodtouch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2-" }, { "model": "iphone iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2-" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "iphone ipodtouch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3-" }, { "model": "iphone iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3-" }, { "model": "iphone ipodtouch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2-" }, { "model": "iphone iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2-" }, { "model": "iphone ipodtouch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1-" }, { "model": "iphone iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1-" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "iphone ipodtouch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.1-" }, { "model": "iphone iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.1-" }, { "model": "iphone ipodtouch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0-" }, { "model": "iphone iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0-" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.9" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.8" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.7" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.6" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.10" }, { "model": "ios beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "safari for windows", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5.1.4" }, { "model": "safari", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5.1.4" }, { "model": "mac os server", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "mac os", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5.1" } ], "sources": [ { "db": "BID", "id": "52364" }, { "db": "JVNDB", "id": "JVNDB-2012-001723" }, { "db": "CNNVD", "id": "CNNVD-201203-147" }, { "db": "NVD", "id": "CVE-2012-0642" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:iphone_os", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipad", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:iphone", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipod_touch", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001723" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Erling Ellingsen of Facebook, pod2g, 2012 iOS Jailbreak Dream Team, Roland Kohler of the German Federal Ministry of Economics and Technology, Eric Melville of American Express", "sources": [ { "db": "BID", "id": "52364" }, { "db": "CNNVD", "id": "CNNVD-201203-196" } ], "trust": 0.9 }, "cve": "CVE-2012-0642", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2012-0642", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-53923", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-0642", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2012-0642", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201203-147", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-53923", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-53923" }, { "db": "JVNDB", "id": "JVNDB-2012-001723" }, { "db": "CNNVD", "id": "CNNVD-201203-147" }, { "db": "NVD", "id": "CVE-2012-0642" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Integer underflow in Apple iOS before 5.1 allows remote attackers to execute arbitrary code or cause a denial of service (device crash) via a crafted catalog file in an HFS disk image. Apple iOS for iPhone, iPod touch, and iPad is prone to multiple security vulnerabilities. These issues affect the following components:\nCFNetwork\nHFS\nKernel\nPasscode Lock\nSafari\nSiri\nVPN\nSuccessfully exploiting these issues may allow attackers to crash the affected device, bypass security restrictions, obtain sensitive information, or execute arbitrary code. Other attacks are also possible. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. An integer underflow vulnerability exists in Apple iOS versions prior to 5.1. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2012-05-09-1 OS X Lion v10.7.4 and Security Update 2012-002\n\nOS X Lion v10.7.4 and Security Update 2012-002 is now available and\naddresses the following:\n\nLogin Window\nAvailable for: OS X Lion v10.7.3, OS X Lion Server v10.7.3\nImpact: Remote admins and persons with physical access to the system\nmay obtain account information\nDescription: An issue existed in the handling of network account\nlogins. The login process recorded sensitive information in the\nsystem log, where other users of the system could read it. The\nsensitive information may persist in saved logs after installation of\nthis update. See http://support.apple.com/kb/TS4272 for more\ninformation on how to securely remove any remaining records. This\nissue only affects systems running OS X Lion v10.7.3 with users of\nLegacy File Vault and/or networked home directories. \nCVE-ID\nCVE-2012-0652 : Terry Reeves and Tim Winningham of the Ohio State\nUniversity, Markus \u0027Jaroneko\u0027 Raty of the Finnish Academy of Fine\nArts, Jaakko Pero of Aalto University, Mark Cohen of Oregon State\nUniversity, Paul Nelson\n\nBluetooth\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: A local user may be able to execute arbitrary code with\nsystem privileges\nDescription: A temporary file race condition issue existed in\nblued\u0027s initialization routine. \nCVE-ID\nCVE-2012-0649 : Aaron Sigel of vtty.com\n\ncurl\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: An attacker may be able to decrypt data protected by SSL\nDescription: There are known attacks on the confidentiality of SSL\n3.0 and TLS 1.0 when a cipher suite uses a block cipher in CBC mode. \ncurl disabled the \u0027empty fragment\u0027 countermeasure which prevented\nthese attacks. This issue is addressed by enabling empty fragments. \nCVE-ID\nCVE-2011-3389 : Apple\n\ncurl\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: Using curl or libcurl with a maliciously crafted URL may\nlead to protocol-specific data injection attacks\nDescription: A data injection issue existed in curl\u0027s handling of\nURLs. This issue is addressed through improved validation of URLs. \nThis issue does not affect systems prior to OS X Lion. \nCVE-ID\nCVE-2012-0036\n\nDirectory Service\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8\nImpact: A remote attacker may obtain sensitive information\nDescription: Multiple issues existed in the directory server\u0027s\nhandling of messages from the network. By sending a maliciously\ncrafted message, a remote attacker could cause the directory server\nto disclose memory from its address space, potentially revealing\naccount credentials or other sensitive information. This issue does\nnot affect OS X Lion systems. The Directory Server is disabled by\ndefault in non-server installations of OS X. This issue does not affect OS X\nLion systems. \nCVE-ID\nCVE-2011-0241 : Cyril CATTIAUX of Tessi Technologies\n\nImageIO\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8\nImpact: Multiple vulnerabilities in libpng\nDescription: libpng is updated to version 1.5.5 to address multiple\nvulnerabilities, the most serious of which may lead to information\ndisclosure. Further information is available via the libpng website\nat http://www.libpng.org/pub/png/libpng.html\nCVE-ID\nCVE-2011-2692\nCVE-2011-3328\n\nImageIO\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8\nImpact: Viewing a maliciously crafted TIFF file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer overflow existed in libtiff\u0027s handling of\nThunderScan encoded TIFF images. This issue is addressed by updating\nlibtiff to version 3.9.5. \nCVE-ID\nCVE-2011-1167\n\nKernel\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: When FileVault is used, the disk may contain unencrypted\nuser data\nDescription: An issue in the kernel\u0027s handling of the sleep image\nused for hibernation left some data unencrypted on disk even when\nFileVault was enabled. This issue is addressed through improved\nhandling of the sleep image, and by overwriting the existing sleep\nimage when updating to OS X v10.7.4. This issue does not affect\nsystems prior to OS X Lion. \nCVE-ID\nCVE-2011-3212 : Felix Groebert of Google Security Team\n\nlibarchive\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Extracting a maliciously crafted archive may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple buffer overflows existed in the handling of\ntar archives and iso9660 files. \nCVE-ID\nCVE-2011-1777\nCVE-2011-1778\n\nlibsecurity\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Verifying a maliciously crafted X.509 certificate, such as\nwhen visiting a maliciously crafted website, may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An uninitialized memory access issue existed in the\nhandling of X.509 certificates. \nCVE-ID\nCVE-2012-0654 : Dirk-Willem van Gulik of WebWeaving.org, Guilherme\nPrado of Conselho da Justica Federal, Ryan Sleevi of Google\n\nlibsecurity\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Support for X.509 certificates with insecure-length RSA keys\nmay expose users to spoofing and information disclosure\nDescription: Certificates signed using RSA keys with insecure key\nlengths were accepted by libsecurity. This issue is addressed by\nrejecting certificates containing RSA keys less than 1024 bits. \nCVE-ID\nCVE-2012-0655\n\nlibxml\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Viewing a maliciously crafted web page may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple vulnerabilities existed in libxml, the most\nserious of which may lead to an unexpected application termination or\narbitrary code execution. These issues are addressed by applying the\nrelevant upstream patches. \nCVE-ID\nCVE-2011-1944 : Chris Evans of Google Chrome Security Team\nCVE-2011-2821 : Yang Dingning of NCNIPC, Graduate University of\nChinese Academy of Sciences\nCVE-2011-2834 : Yang Dingning of NCNIPC, Graduate University of\nChinese Academy of Sciences\nCVE-2011-3919 : Juri Aedla\n\nLoginUIFramework\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: If the Guest user is enabled, a user with physical access to\nthe computer may be able to log in to a user other than the Guest\nuser without entering a password\nDescription: A race condition existed in the handling of Guest user\nlogins. This issue does not affect systems prior to OS X Lion. \nCVE-ID\nCVE-2012-0656 : Francisco Gomez (espectalll123)\n\nPHP\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: Multiple vulnerabilities in PHP\nDescription: PHP is updated to version 5.3.10 to address several\nvulnerabilities, the most serious of which may lead to arbitrary code\nexecution. Further information is available via the PHP web site at\nhttp://www.php.net\nCVE-ID\nCVE-2011-4566\nCVE-2011-4885\nCVE-2012-0830\n\nQuartz Composer\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: A user with physical access to the computer may be able to\ncause Safari to launch if the screen is locked and the RSS Visualizer\nscreen saver is used\nDescription: An access control issue existed in Quartz Composer\u0027s\nhandling of screen savers. This issue is addressed through improved\nchecking for whether or not the screen is locked. \nCVE-ID\nCVE-2012-0657 : Aaron Sigel of vtty.com\n\nQuickTime\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Viewing a maliciously crafted movie file during progressive\ndownload may lead to an unexpected application termination or\narbitrary code execution\nDescription: A buffer overflow existed in the handling of audio\nsample tables. \nCVE-ID\nCVE-2012-0658 : Luigi Auriemma working with HP\u0027s Zero Day Initiative\n\nQuickTime\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Viewing a maliciously crafted MPEG file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: An integer overflow existed in the handling of MPEG\nfiles. \nCVE-ID\nCVE-2012-0659 : An anonymous researcher working with HP\u0027s Zero Day\nInitiative\n\nQuickTime\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Viewing a maliciously crafted MPEG file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A buffer underflow existed in the handling of MPEG\nfiles. \nCVE-ID\nCVE-2012-0660 : Justin Kim at Microsoft and Microsoft Vulnerability\nResearch\n\nQuickTime\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: Viewing a maliciously crafted movie file may lead to an\nunexpected application termination or arbitrary code execution\nDescription: A use after free issue existed in the handling of\nJPEG2000 encoded movie files. This issue does not affect systems\nprior to OS X Lion. \nCVE-ID\nCVE-2012-0661 : Damian Put working with HP\u0027s Zero Day Initiative\n\nRuby\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: Multiple vulnerabilities in Ruby\nDescription: Ruby is updated to 1.8.7-p357 to address multiple\nvulnerabilities. These issues do not\naffect OS X Lion systems. \nCVE-ID\nCVE-2012-0870 : Andy Davis of NGS Secure\nCVE-2012-1182 : An anonymous researcher working with HP\u0027s Zero Day\nInitiative\n\nSecurity Framework\nAvailable for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,\nOS X Lion v10.7 to v10.7.3, OS X Lion Server v10.7 to v10.7.3\nImpact: A remote attacker may cause an unexpected application\ntermination or arbitrary code execution\nDescription: An integer overflow existed in the Security framework. \nProcessing untrusted input with the Security framework could result\nin memory corruption. This issue does not affect 32-bit processes. \nCVE-ID\nCVE-2012-0662 : aazubel working with HP\u0027s Zero Day Initiative\n\nTime Machine\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: A remote attacker may access a user\u0027s Time Machine backup\ncredentials\nDescription: The user may designate a Time Capsule or remote AFP\nvolume attached to an AirPort Base Station to be used for Time\nMachine backups. Beginning with AirPort Base Station and Time Capsule\nFirmware Update 7.6, Time Capsules and Base Stations support a secure\nSRP-based authentication mechanism over AFP. However, Time Machine\ndid not require that the SRP-based authentication mechanism was used\nfor subsequent backup operations, even if Time Machine was initially\nconfigured or had ever contacted a Time Capsule or Base Station that\nsupported it. An attacker who is able to spoof the remote volume\ncould gain access to user\u0027s Time Capsule credentials, although not\nbackup data, sent by the user\u0027s system. This issue is addressed by\nrequiring use of the SRP-based authentication mechanism if the backup\ndestination has ever supported it. \nCVE-ID\nCVE-2012-0675 : Renaud Deraison of Tenable Network Security, Inc. \n\nX11\nAvailable for: OS X Lion v10.7 to v10.7.3,\nOS X Lion Server v10.7 to v10.7.3\nImpact: Applications that use libXfont to process LZW-compressed\ndata may be vulnerable to an unexpected application termination or\narbitrary code execution\nDescription: A buffer overflow existed in libXfont\u0027s handling of\nLZW-compressed data. This issue is addressed by updating libXfont to\nversion 1.4.4. \nCVE-ID\nCVE-2011-2895 : Tomas Hoger of Red Hat\n\n\nNote: Additionally, this update filters dynamic linker environment\nvariables from a customized environment property list in the user\u0027s\nhome directory, if present. \n\n\nOS X Lion v10.7.4 and Security Update 2012-002 may be obtained from\nthe Software Update pane in System Preferences, or Apple\u0027s Software\nDownloads web site:\nhttp://www.apple.com/support/downloads/\n\nThe Software Update utility will present the update that applies\nto your system configuration. Only one is needed, either\nSecurity Update 2012-002 or OS X v10.7.4. \n\nFor OS X Lion v10.7.3\nThe download file is named: MacOSXUpd10.7.4.dmg\nIts SHA-1 digest is: 04c53a6148ebd8c5733459620b7c1e2172352d36\n\nFor OS X Lion v10.7 and v10.7.2\nThe download file is named: MacOSXUpdCombo10.7.4.dmg\nIts SHA-1 digest is: b11d511a50d9b728532688768fcdee9c1930037f\n\nFor OS X Lion Server v10.7.3\nThe download file is named: MacOSXServerUpd10.7.4.dmg\nIts SHA-1 digest is: 3cb5699c8ecf7d70145f3692555557f7206618b2\n\nFor OS X Lion Server v10.7 and v10.7.2\nThe download file is named: MacOSXServerUpdCombo10.7.4.dmg\nIts SHA-1 digest is: 917207e922056718b9924ef73caa5fcac06b7240\n\nFor Mac OS X v10.6.8\nThe download file is named: SecUpd2012-002Snow.dmg\nIts SHA-1 digest is: 9669fbd9952419e70ac20109cf4db37f9932e9f8\n\nFor Mac OS X Server v10.6.8\nThe download file is named: SecUpdSrvr2012-002.dmg\nIts SHA-1 digest is: 34da2dcbc8d45362f1d5e3b1b218112a729ae1c3\n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.16 (Darwin)\n\niQEcBAEBAgAGBQJPqtkzAAoJEGnF2JsdZQeee2MIAKAcBIY6k0LU2fDLThFoAgKh\nWkYpGmCwa7L6n02geHzWrUCK/P/0yGWzDDqLfKlKuKbXdEIRP2wZTlvrqZHLzNO/\nnXgz3HN1Xbll8yVXrGMEsoTD23Q+2/ZKLGMlSDw3vgBTVi/g4Rcer4Eew5mTkaoA\nj4WkrzgVUIxCMrsWMMwu1SVaizBuTYbNVzCzV3JPF1H0zVtVKgwWjhTdOJ/RDksD\nsjZG1XIEqVyv1rNk5BtjxVPFaJGpf9mcHiH8XyKQ0bC6ToM2r3B++Layoc5k1K0V\nOxKGSfWOEbWi/KR6vlXyVbe7JnU7a/V0C25HXhnoMEtoTCleZACEByLVtBC87LU=\n=6Eiz\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nApple iOS Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA48288\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48288/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48288\n\nRELEASE DATE:\n2012-03-09\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48288/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48288/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48288\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA weakness and multiple vulnerabilities have been reported in Apple\niOS, which can be exploited by malicious people with physical access\nto bypass certain security restrictions and by malicious people to\ndisclose sensitive information, conduct cross-site scripting attacks,\nbypass certain security restrictions, and compromise a user\u0027s device. \n\n1) An error within the CFNetwork component when handling URLs can be\nexploited to disclose sensitive information by tricking the user into\nvisiting a malicious website. \n\n3) A logic error within the kernel does not properly handle debug\nsystem calls and can be exploited to bypass the sandbox\nrestrictions. \n\n4) An integer overflow error within the libresolv library when\nhandling DNS resource records can be exploited to corrupt heap\nmemory. \n\nFor more information see vulnerability #21 in:\nSA47843\n\n5) A race condition error in the Passcode Lock component when\nhandling slide to dial gestures can be exploited to bypass the\nPasscode Lock screen. \n\n6) The weakness is caused due to the Private Browsing mode in Safari\nnot properly preventing recording of visits to certain sites using\nthe pushState or replaceState JavaScript methods. \n\n7) An error within the Siri component when handling voice commands\ncan be exploited to bypass the screen lock and forward an open mail\nmessage to an arbitrary recipient. \n\n8) A format string error in the VPN component when handling racoon\nconfiguration files can be exploited to execute arbitrary code via a\nspecially crafted racoon configuration file. \n\n9) A cross-origin error in the WebKit component can be exploited to\nbypass the same-origin policy and disclose a cookie by tricking the\nuser into visiting a malicious website. \n\n10) An error within the WebKit component when handling drag-and-drop\nactions can be exploited to conduct cross-site scripting attacks. \n\n11) Multiple unspecified errors within the WebKit component can be\nexploited to conduct cross-site scripting attacks. \n\n12) Some vulnerabilities are caused due to a bundled vulnerable\nversion of WebKit. \n\nFor more information:\nSA45698\nSA46049\nSA46308\nSA46594\nSA46815\nSA47231\nSA47694\n\nSuccessful exploitation of vulnerabilities #2, #4, #8, and #12 may\nallow execution of arbitrary code. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n1) Erling Ellingsen, Facebook. \n2, 8) pod2g. \n3) 2012 iOS Jailbreak Dream Team. \n5) Roland Kohler, the German Federal Ministry of Economics and\nTechnology. \n6) Eric Melville, American Express. \n9) Sergey Glazunov. \n10) Adam Barth, Google Chrome Security Team. \n11) Sergey Glazunov, Jochen Eisinger of Google Chrome Team, Alan\nAustin of polyvore.com. \n\nORIGINAL ADVISORY:\nApple:\nhttp://support.apple.com/kb/HT5192\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-0642" }, { "db": "JVNDB", "id": "JVNDB-2012-001723" }, { "db": "BID", "id": "52364" }, { "db": "VULHUB", "id": "VHN-53923" }, { "db": "PACKETSTORM", "id": "112595" }, { "db": "PACKETSTORM", "id": "110650" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-0642", "trust": 2.9 }, { "db": "SECUNIA", "id": "48288", "trust": 1.2 }, { "db": "SECTRACK", "id": "1026774", "trust": 1.1 }, { "db": "BID", "id": "52364", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2012-001723", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201203-147", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201203-196", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2012-03-07-2", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-53923", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112595", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110650", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-53923" }, { "db": "BID", "id": "52364" }, { "db": "JVNDB", "id": "JVNDB-2012-001723" }, { "db": "PACKETSTORM", "id": "112595" }, { "db": "PACKETSTORM", "id": "110650" }, { "db": "CNNVD", "id": "CNNVD-201203-196" }, { "db": "CNNVD", "id": "CNNVD-201203-147" }, { "db": "NVD", "id": "CVE-2012-0642" } ] }, "id": "VAR-201203-0105", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-53923" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:18:21.140000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT5281", "trust": 0.8, "url": "http://support.apple.com/kb/HT5281" }, { "title": "HT5192", "trust": 0.8, "url": "http://support.apple.com/kb/HT5192" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001723" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-53923" }, { "db": "JVNDB", "id": "JVNDB-2012-001723" }, { "db": "NVD", "id": "CVE-2012-0642" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2012/mar/msg00001.html" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2012/may/msg00001.html" }, { "trust": 1.1, "url": "http://support.apple.com/kb/ht5281" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id?1026774" }, { "trust": 1.1, "url": "http://secunia.com/advisories/48288" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0642" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu341747" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu692779/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0642" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/52364" }, { "trust": 0.3, "url": "http://www.apple.com/iphone/softwareupdate/" }, { "trust": 0.3, "url": "http://www.apple.com/ipad/" }, { "trust": 0.3, "url": "http://www.apple.com/iphone/" }, { "trust": 0.3, "url": "http://www.apple.com/ipodtouch/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0036" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0658" }, { "trust": 0.1, "url": "http://www.php.net" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1167" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1005" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0651" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0656" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0642" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0655" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4885" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2834" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0657" }, { "trust": 0.1, "url": "http://www.apple.com/support/downloads/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3919" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0649" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2692" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0652" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1944" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1004" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ts4272" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2895" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0241" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1777" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4566" }, { "trust": 0.1, "url": "http://www.libpng.org/pub/png/libpng.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4815" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1778" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3212" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0654" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3328" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2821" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48288/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48288" }, { "trust": 0.1, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48288/" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht5192" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-53923" }, { "db": "BID", "id": "52364" }, { "db": "JVNDB", "id": "JVNDB-2012-001723" }, { "db": "PACKETSTORM", "id": "112595" }, { "db": "PACKETSTORM", "id": "110650" }, { "db": "CNNVD", "id": "CNNVD-201203-196" }, { "db": "CNNVD", "id": "CNNVD-201203-147" }, { "db": "NVD", "id": "CVE-2012-0642" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-53923" }, { "db": "BID", "id": "52364" }, { "db": "JVNDB", "id": "JVNDB-2012-001723" }, { "db": "PACKETSTORM", "id": "112595" }, { "db": "PACKETSTORM", "id": "110650" }, { "db": "CNNVD", "id": "CNNVD-201203-196" }, { "db": "CNNVD", "id": "CNNVD-201203-147" }, { "db": "NVD", "id": "CVE-2012-0642" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-03-08T00:00:00", "db": "VULHUB", "id": "VHN-53923" }, { "date": "2012-03-08T00:00:00", "db": "BID", "id": "52364" }, { "date": "2012-03-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001723" }, { "date": "2012-05-10T15:19:38", "db": "PACKETSTORM", "id": "112595" }, { "date": "2012-03-11T05:32:13", "db": "PACKETSTORM", "id": "110650" }, { "date": "2012-03-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-196" }, { "date": "2012-03-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-147" }, { "date": "2012-03-08T22:55:04.137000", "db": "NVD", "id": "CVE-2012-0642" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-29T00:00:00", "db": "VULHUB", "id": "VHN-53923" }, { "date": "2012-09-20T17:10:00", "db": "BID", "id": "52364" }, { "date": "2012-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-001723" }, { "date": "2012-03-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-196" }, { "date": "2012-03-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201203-147" }, { "date": "2024-11-21T01:35:26.917000", "db": "NVD", "id": "CVE-2012-0642" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote \u203b local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-196" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple iOS and Mac OS X of HFS Integer underflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-001723" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201203-147" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.