ID

VAR-200906-0058


CVE

CVE-2009-0961


TITLE

Apple iPhone OS of Mail Component call vulnerability without user authorization

Trust: 0.8

sources: JVNDB: JVNDB-2009-001849

DESCRIPTION

The Mail component in Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 dismisses the call approval dialog when another alert appears, which might allow remote attackers to force the iPhone to place a call without user approval by causing an application to trigger an alert. Apple iPhone and iPod touch are prone to multiple vulnerabilities. Successfully exploiting these issues may allow attackers to bypass security restrictions, obtain sensitive information, or cause denial-of-service conditions. These issues affect the following: iPhone OS 1.0 through 2.2.1 iPhone OS for iPod touch 1.1 through 2.2.1 This BID is being retired. The following individual records have been created to better document these issues: 35433 Apple iPhone and iPod touch MPEG-4 Video Codec Denial of Service Vulnerability 35434 Apple iPhone and iPod touch Mail Client Information Disclosure Weakness 35436 Apple iPhone and iPod touch Configuration Profile Handling Information Disclosure Vulnerability 35425 Apple iPhone Call Approval Dialog Security Bypass Vulnerability 35445 Apple iPhone and iPod touch ICMP Echo Request Remote Denial of Service Vulnerability 35446 Apple iPhone and iPod touch HTMLSelectElement Denial of Service Vulnerability 35447 Apple iPhone and iPod touch Untrusted Certificate Exception Information Disclosure Vulnerability 35448 Apple iPhone and iPod touch Safari Search History Information Disclosure Vulnerability. If the app causes a warning when showing Mail's call permission dialog, the call can be made without user interaction

Trust: 2.25

sources: NVD: CVE-2009-0961 // JVNDB: JVNDB-2009-001849 // BID: 35414 // BID: 35425 // VULHUB: VHN-38407

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:2.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.5

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.2.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.1.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.1.4

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:2.0.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.3

Trust: 1.0

vendor:applemodel:ipod touchscope:eqversion:*

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:*

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.0

vendor:applemodel:iosscope:eqversion:1.0 to 2.2.1

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:1.1 to 2.2.1

Trust: 0.8

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.6

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.6

vendor:applemodel:iphonescope:neversion:3.0

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:3.0

Trust: 0.3

sources: BID: 35414 // BID: 35425 // JVNDB: JVNDB-2009-001849 // CNNVD: CNNVD-200906-313 // NVD: CVE-2009-0961

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0961
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-0961
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200906-313
value: MEDIUM

Trust: 0.6

VULHUB: VHN-38407
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-0961
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2009-0961
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-38407
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-38407 // JVNDB: JVNDB-2009-001849 // CNNVD: CNNVD-200906-313 // NVD: CVE-2009-0961

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2009-001849 // NVD: CVE-2009-0961

THREAT TYPE

network

Trust: 0.6

sources: BID: 35414 // BID: 35425

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200906-313

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001849

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-38407

PATCH

title:HT3639url:http://support.apple.com/kb/HT3639

Trust: 0.8

title:HT3639url:http://support.apple.com/kb/HT3639?viewlocale=ja_JP

Trust: 0.8

title:Apple iPhone Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=203142

Trust: 0.6

sources: JVNDB: JVNDB-2009-001849 // CNNVD: CNNVD-200906-313

EXTERNAL IDS

db:NVDid:CVE-2009-0961

Trust: 2.8

db:OSVDBid:55238

Trust: 2.5

db:VUPENid:ADV-2009-1621

Trust: 2.5

db:BIDid:35414

Trust: 2.0

db:XFid:51210

Trust: 0.8

db:JVNDBid:JVNDB-2009-001849

Trust: 0.8

db:CNNVDid:CNNVD-200906-313

Trust: 0.6

db:BIDid:35425

Trust: 0.4

db:SEEBUGid:SSVID-86301

Trust: 0.1

db:SEEBUGid:SSVID-86299

Trust: 0.1

db:SEEBUGid:SSVID-86300

Trust: 0.1

db:EXPLOIT-DBid:33045

Trust: 0.1

db:EXPLOIT-DBid:33044

Trust: 0.1

db:EXPLOIT-DBid:33046

Trust: 0.1

db:VULHUBid:VHN-38407

Trust: 0.1

sources: VULHUB: VHN-38407 // BID: 35414 // BID: 35425 // JVNDB: JVNDB-2009-001849 // CNNVD: CNNVD-200906-313 // NVD: CVE-2009-0961

REFERENCES

url:http://osvdb.org/55238

Trust: 2.5

url:http://www.vupen.com/english/advisories/2009/1621

Trust: 2.5

url:http://support.apple.com/kb/ht3639

Trust: 2.3

url:http://lists.apple.com/archives/security-announce/2009/jun/msg00005.html

Trust: 1.7

url:http://www.securityfocus.com/bid/35414

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/51210

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0961

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/51210

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0961

Trust: 0.8

url:http://www.apple.com/iphone/

Trust: 0.6

url:/archive/1/504403

Trust: 0.6

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:http://source.android.com/

Trust: 0.3

url:http://webkit.org/

Trust: 0.3

url:/archive/1/504414

Trust: 0.3

url:http://www.mulliner.org/security/advisories/iphone_safari_phone-auto-dial_vulnerability_advisory.txt

Trust: 0.3

sources: VULHUB: VHN-38407 // BID: 35414 // BID: 35425 // JVNDB: JVNDB-2009-001849 // CNNVD: CNNVD-200906-313 // NVD: CVE-2009-0961

CREDITS

Oskar Lissheim-BoethiusOliver QuasChristian Schmitz

Trust: 0.6

sources: CNNVD: CNNVD-200906-313

SOURCES

db:VULHUBid:VHN-38407
db:BIDid:35414
db:BIDid:35425
db:JVNDBid:JVNDB-2009-001849
db:CNNVDid:CNNVD-200906-313
db:NVDid:CVE-2009-0961

LAST UPDATE DATE

2025-04-10T21:41:42.176000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-38407date:2017-08-17T00:00:00
db:BIDid:35414date:2009-06-19T23:09:00
db:BIDid:35425date:2009-06-18T19:50:00
db:JVNDBid:JVNDB-2009-001849date:2009-08-06T00:00:00
db:CNNVDid:CNNVD-200906-313date:2022-08-10T00:00:00
db:NVDid:CVE-2009-0961date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-38407date:2009-06-19T00:00:00
db:BIDid:35414date:2009-06-17T00:00:00
db:BIDid:35425date:2009-06-17T00:00:00
db:JVNDBid:JVNDB-2009-001849date:2009-08-06T00:00:00
db:CNNVDid:CNNVD-200906-313date:2009-06-19T00:00:00
db:NVDid:CVE-2009-0961date:2009-06-19T16:30:00.297