var-201006-0313
Vulnerability from variot
ImageIO in Apple iOS before 4 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG image. Apple iOS for iPhone and iPod touch is prone to multiple security vulnerabilities, including information-disclosure, remote code-execution, denial-of-service, security-bypass, and spoofing issues. These issues affect the Sandbox, CFNetwork, ImageIO, Passcode Lock, Safari, Settings, and WebKit components. Successfully exploiting these issues may allow attackers to crash the affected device, bypass security restrictions, obtain sensitive information, or execute arbitrary code. Other attacks are also possible. Versions prior to iOS 4 are vulnerable. This BID is being retired. The following individual records exist to better document the issues: 41047 Apple iPhone and iPod touch Application Sandbox User Photo Library Security Bypass Vulnerability 41048 Apple iPhone/iPod touch Prior to iOS 4 Wireless Network Security Weakness 41049 Apple iPhone/iPod touch Prior to iOS 4 URI Stack Based Buffer Overflow Vulnerability 41051 WebKit 'history.replaceState' Cross-Origin Information Disclosure Vulnerability 41052 Apple iPhone/iPod touch Prior to iOS 4 JPEG File Buffer Overflow Vulnerability 41053 WebKit 'JavaScriptCore' Page Transition Remote Code Execution Vulnerability 41054 WebKit Table Handling Remote Code Execution Vulnerability 41065 Apple iPhone/iPod touch Prior to iOS 4 Safari Security Bypass Vulnerability 41066 Apple iPhone and iPod touch Race Condition Security Bypass Vulnerability 41067 Apple iPhone/iPod touch Prior to iOS 4 Passcode Lock Authentication Bypass Vulnerability 41068 WebKit User Interface Cross Domain Spoofing Vulnerability. Attackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Apple iOS is an operating system developed by Apple Inc. for the iPhone. It is mainly used for iPhone, iPod touch and iPad
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201006-0313", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "4.0" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "2.0 to 3.1.3" }, { "model": "ios for ipod touch", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "2.1 to 3.1.3" }, { "model": "iphone", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.1.3" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.1.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.1.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.2.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0" }, { "model": "ipod touch", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "0" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.1" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.2" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0" }, { "model": "iphone", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "0" }, { "model": "ios", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "4" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "2.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "3.1.2" } ], "sources": [ { "db": "BID", "id": "41016" }, { "db": "BID", "id": "41052" }, { "db": "JVNDB", "id": "JVNDB-2010-001676" }, { "db": "CNNVD", "id": "CNNVD-201006-363" }, { "db": "NVD", "id": "CVE-2010-1753" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:iphone_os", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:iphone_os_for_ipod_touch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:iphone", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipod_touch", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001676" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Zac White; Laurent OUDOT of TEHTRI-Security; Ladd Van Tol of Critical Path Software; Apple; Jason Dent of Street Side Software; Sidney San Martin of DeepTech, Inc.; Wilfried Teiken; Darin Fisher of Google Inc.; Wayne Pan of AdMob, Inc.; wushi of team509.", "sources": [ { "db": "BID", "id": "41016" } ], "trust": 0.3 }, "cve": "CVE-2010-1753", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2010-1753", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-44358", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-1753", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2010-1753", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201006-363", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-44358", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-44358" }, { "db": "JVNDB", "id": "JVNDB-2010-001676" }, { "db": "CNNVD", "id": "CNNVD-201006-363" }, { "db": "NVD", "id": "CVE-2010-1753" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ImageIO in Apple iOS before 4 on the iPhone and iPod touch allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted JPEG image. Apple iOS for iPhone and iPod touch is prone to multiple security vulnerabilities, including information-disclosure, remote code-execution, denial-of-service, security-bypass, and spoofing issues. These issues affect the Sandbox, CFNetwork, ImageIO, Passcode Lock, Safari, Settings, and WebKit components. \nSuccessfully exploiting these issues may allow attackers to crash the affected device, bypass security restrictions, obtain sensitive information, or execute arbitrary code. Other attacks are also possible. \nVersions prior to iOS 4 are vulnerable. \nThis BID is being retired. The following individual records exist to better document the issues:\n41047 Apple iPhone and iPod touch Application Sandbox User Photo Library Security Bypass Vulnerability\n41048 Apple iPhone/iPod touch Prior to iOS 4 Wireless Network Security Weakness\n41049 Apple iPhone/iPod touch Prior to iOS 4 URI Stack Based Buffer Overflow Vulnerability\n41051 WebKit \u0027history.replaceState\u0027 Cross-Origin Information Disclosure Vulnerability\n41052 Apple iPhone/iPod touch Prior to iOS 4 JPEG File Buffer Overflow Vulnerability\n41053 WebKit \u0027JavaScriptCore\u0027 Page Transition Remote Code Execution Vulnerability\n41054 WebKit Table Handling Remote Code Execution Vulnerability\n41065 Apple iPhone/iPod touch Prior to iOS 4 Safari Security Bypass Vulnerability\n41066 Apple iPhone and iPod touch Race Condition Security Bypass Vulnerability\n41067 Apple iPhone/iPod touch Prior to iOS 4 Passcode Lock Authentication Bypass Vulnerability\n41068 WebKit User Interface Cross Domain Spoofing Vulnerability. \nAttackers may leverage this issue to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions. Apple iOS is an operating system developed by Apple Inc. for the iPhone. It is mainly used for iPhone, iPod touch and iPad", "sources": [ { "db": "NVD", "id": "CVE-2010-1753" }, { "db": "JVNDB", "id": "JVNDB-2010-001676" }, { "db": "BID", "id": "41016" }, { "db": "BID", "id": "41052" }, { "db": "VULHUB", "id": "VHN-44358" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-1753", "trust": 2.8 }, { "db": "BID", "id": "41016", "trust": 2.0 }, { "db": "XF", "id": "59632", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2010-001676", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201006-363", "trust": 0.7 }, { "db": "BID", "id": "41052", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-44358", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-44358" }, { "db": "BID", "id": "41016" }, { "db": "BID", "id": "41052" }, { "db": "JVNDB", "id": "JVNDB-2010-001676" }, { "db": "CNNVD", "id": "CNNVD-201006-363" }, { "db": "NVD", "id": "CVE-2010-1753" } ] }, "id": "VAR-201006-0313", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-44358" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:43:17.227000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4225", "trust": 0.8, "url": "http://support.apple.com/kb/HT4225" }, { "title": "HT4225", "trust": 0.8, "url": "http://support.apple.com/kb/HT4225?viewlocale=ja_JP" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001676" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-44358" }, { "db": "JVNDB", "id": "JVNDB-2010-001676" }, { "db": "NVD", "id": "CVE-2010-1753" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2010/jun/msg00003.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/41016" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht4225" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59632" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1753" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/59632" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1753" }, { "trust": 0.6, "url": "http://www.apple.com/iphone/softwareupdate/" }, { "trust": 0.6, "url": "http://www.apple.com/iphone/" }, { "trust": 0.6, "url": "http://www.apple.com/ipodtouch/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-44358" }, { "db": "BID", "id": "41016" }, { "db": "BID", "id": "41052" }, { "db": "JVNDB", "id": "JVNDB-2010-001676" }, { "db": "CNNVD", "id": "CNNVD-201006-363" }, { "db": "NVD", "id": "CVE-2010-1753" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-44358" }, { "db": "BID", "id": "41016" }, { "db": "BID", "id": "41052" }, { "db": "JVNDB", "id": "JVNDB-2010-001676" }, { "db": "CNNVD", "id": "CNNVD-201006-363" }, { "db": "NVD", "id": "CVE-2010-1753" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-06-22T00:00:00", "db": "VULHUB", "id": "VHN-44358" }, { "date": "2010-06-21T00:00:00", "db": "BID", "id": "41016" }, { "date": "2010-06-21T00:00:00", "db": "BID", "id": "41052" }, { "date": "2010-07-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001676" }, { "date": "2010-06-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201006-363" }, { "date": "2010-06-22T20:30:01.587000", "db": "NVD", "id": "CVE-2010-1753" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-11-16T00:00:00", "db": "VULHUB", "id": "VHN-44358" }, { "date": "2010-06-23T16:08:00", "db": "BID", "id": "41016" }, { "date": "2010-06-21T00:00:00", "db": "BID", "id": "41052" }, { "date": "2010-07-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001676" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201006-363" }, { "date": "2024-11-21T01:15:07.643000", "db": "NVD", "id": "CVE-2010-1753" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "41016" }, { "db": "BID", "id": "41052" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple iOS of ImageIO Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001676" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201006-363" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.