ID

VAR-201111-0225


CVE

CVE-2011-3442


TITLE

Apple iOS Arbitrary kernel unsigned code execution vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2011-002840

DESCRIPTION

The kernel in Apple iOS before 5.0.1 does not ensure the validity of flag combinations for an mmap system call, which allows local users to execute arbitrary unsigned code via a crafted app. Apple iOS is prone to a security-bypass vulnerability that affects the code signing security feature. Attackers can exploit this issue by enticing an unsuspecting user to install a specially crafted application on the affected device. Successful exploits will allow attackers to bypass certain security restrictions and execute arbitrary code on the affected device. Apple iOS 4.3 through 5.0 are vulnerable. NOTE: This vulnerability only affects iPad 2. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2011-11-10-1 iOS 5.0.1 Software Update iOS 5.0.1 Software Update is now available and addresses the following: CFNetwork Available for: iOS 3.0 through 5.0 for iPhone 3GS, iPhone 4 and iPhone 4S, iOS 3.1 through 5.0 for iPod touch (3rd generation) and later, iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in CFNetwork's handling of maliciously crafted URLs. When accessing a maliciously crafted HTTP or HTTPS URL, CFNetwork could navigate to an incorrect server. CVE-ID CVE-2011-3246 : Erling Ellingsen of Facebook CoreGraphics Available for: iOS 3.0 through 5.0 for iPhone 3GS, iPhone 4 and iPhone 4S, iOS 3.1 through 5.0 for iPod touch (3rd generation) and later, iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 Impact: Viewing a document containing a maliciously crafted font may lead to arbitrary code execution Description: Multiple memory corruption issues existed in FreeType, the most serious of which may lead to arbitrary code execution when processing a maliciously crafted font. CVE-ID CVE-2011-3439 : Apple Data Security Available for: iOS 3.0 through 5.0 for iPhone 3GS, iPhone 4 and iPhone 4S, iOS 3.1 through 5.0 for iPod touch (3rd generation) and later, iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: Two certificate authorities in the list of trusted root certificates have independently issued intermediate certificates to DigiCert Malaysia. DigiCert Malaysia has issued certificates with weak keys that it is unable to revoke. An attacker with a privileged network position could intercept user credentials or other sensitive information intended for a site with a certificate issued by DigiCert Malaysia. This issue is addressed by configuring default system trust settings so that DigiCert Malaysia's certificates are not trusted. We would like to acknowledge Bruce Morton of Entrust, Inc. for reporting this issue. Kernel Available for: iOS 3.0 through 5.0 for iPhone 3GS, iPhone 4 and iPhone 4S, iOS 3.1 through 5.0 for iPod touch (3rd generation) and later, iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 Impact: An application may execute unsigned code Description: A logic error existed in the mmap system call's checking of valid flag combinations. This issue may lead to a bypass of codesigning checks. This issue does not affect devices running iOS prior to version 4.3. CVE-ID CVE-2011-3442 : Charlie Miller of Accuvant Labs libinfo Available for: iOS 3.0 through 5.0 for iPhone 3GS, iPhone 4 and iPhone 4S, iOS 3.1 through 5.0 for iPod touch (3rd generation) and later, iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in libinfo's handling of DNS name lookups. When resolving a maliciously crafted hostname, libinfo could return an incorrect result. CVE-ID CVE-2011-3441 : Erling Ellingsen of Facebook, Per Johansson of Blocket AB Passcode Lock Available for: iOS 4.3 through 5.0 for iPad 2 Impact: A person with physical access to a locked iPad 2 may be able to access some of the user's data Description: When a Smart Cover is opened while iPad 2 is confirming power off in the locked state, the iPad does not request a passcode. This allows some access to the iPad, but data protected by Data Protection is inaccessible and apps cannot be launched. CVE-ID CVE-2011-3440 Installation note: This update is only available through iTunes, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes will automatically check Apple's update server on its weekly schedule. When an update is detected, it will download it. When the iPhone, iPod touch or iPad is docked, iTunes will present the user with the option to install the update. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iPhone, iPod touch, or iPad. The automatic update process may take up to a week depending on the day that iTunes checks for updates. You may manually obtain the update via the Check for Updates button within iTunes. After doing this, the update can be applied when your iPhone, iPod touch, or iPad is docked to your computer. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "5.0.1 (9A405)". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin) iQEcBAEBAgAGBQJOuxWjAAoJEGnF2JsdZQeeYkAH/1Yz7Y7kSrJKjNeGyxLpliM8 1r33Xu0r6+WJgrjq1Ym4S6Yz1SJvz6uyvt8yLlKMxQHpYxmTjoToVbzvCvr81Kam tpXhpfihRtwzSDEJAV7jRShtylVwoTIfUBTp982eun+2PrJmHI3P070pgCjUiT/C 63O4sen+K0hhT2cJxzWYsw1hmXv8OAmy+snUOh44ovMEa10KrpOqxr6sjrSfBbpU gHyD1BOVB5VPUWSpj+R9/Eji634StaPkmy1yp+iv926MpGMGYT8mB07ec4MP4C78 b7ZaKzmhZILikMR6+fiOUWIZJQ0M8TYzyMol15DP/5mnXiHr46eZvsqWeAuvsok= =RjAe -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- SC World Congress, New York, USA, 16 November 2011 Visit the Secunia booth (#203) and discover how you can improve your handling of third party programs: http://secunia.com/resources/events/sc_2011/ ---------------------------------------------------------------------- TITLE: Apple iOS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA46747 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/46747/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=46747 RELEASE DATE: 2011-11-11 DISCUSS ADVISORY: http://secunia.com/advisories/46747/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/46747/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=46747 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people to disclose certain sensitive information, conduct spoofing attacks, and compromise a user's device. 1) An error within the CFNetwork component when handling URLs can be exploited to redirect a user to an incorrect server. This is related to vulnerability #4 in: SA46377 2) Multiple errors within the CoreGraphics component when handling FreeType fonts can be exploited to corrupt memory. Successful exploitation of this vulnerability requires that the user is tricked into installing a malicious App. 4) An error within libinfo when handling DNS name lookups can be exploited to spoof lookups. PROVIDED AND/OR DISCOVERED BY: 2) Reported by the vendor. The vendor credits: 1) Erling Ellingsen, Facebook. 3) Charlie Miller, Accuvant Labs. 4) Erling Ellingsen, Facebook and Per Johansson, Blocket AB. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT5052 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.25

sources: NVD: CVE-2011-3442 // JVNDB: JVNDB-2011-002840 // BID: 50575 // VULHUB: VHN-51387 // PACKETSTORM: 106874 // PACKETSTORM: 106986 // PACKETSTORM: 106896

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:4.3.5

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.3.4

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 1.0

vendor:applemodel:iosscope:eqversion:3.0 to 5.0 (iphone 3gs

Trust: 0.8

vendor:applemodel:iosscope:eqversion:iphone 4 and iphone 4s for )

Trust: 0.8

vendor:applemodel:iosscope:eqversion:3.1 to 5.0 (ipod touch (3rd generation) after )

Trust: 0.8

vendor:applemodel:iosscope:eqversion:3.2 to 5.0 (ipad for )

Trust: 0.8

vendor:applemodel:iosscope:eqversion:4.3 to 5.0 (ipad 2 for )

Trust: 0.8

vendor:applemodel:ipadscope: - version: -

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:neversion:5.0.1

Trust: 0.3

sources: BID: 50575 // JVNDB: JVNDB-2011-002840 // CNNVD: CNNVD-201111-239 // NVD: CVE-2011-3442

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3442
value: HIGH

Trust: 1.0

NVD: CVE-2011-3442
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201111-239
value: HIGH

Trust: 0.6

VULHUB: VHN-51387
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-3442
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-51387
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-51387 // JVNDB: JVNDB-2011-002840 // CNNVD: CNNVD-201111-239 // NVD: CVE-2011-3442

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-51387 // JVNDB: JVNDB-2011-002840 // NVD: CVE-2011-3442

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201111-239

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201111-239

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002840

PATCH

title:HT5052url:http://support.apple.com/kb/HT5052

Trust: 0.8

sources: JVNDB: JVNDB-2011-002840

EXTERNAL IDS

db:NVDid:CVE-2011-3442

Trust: 2.9

db:SECTRACKid:1026287

Trust: 1.1

db:JVNDBid:JVNDB-2011-002840

Trust: 0.8

db:CNNVDid:CNNVD-201111-239

Trust: 0.7

db:SECUNIAid:46836

Trust: 0.7

db:SECUNIAid:46747

Trust: 0.7

db:NSFOCUSid:18170

Trust: 0.6

db:NSFOCUSid:18172

Trust: 0.6

db:APPLEid:APPLE-SA-2011-11-10-1

Trust: 0.6

db:BIDid:50575

Trust: 0.4

db:VULHUBid:VHN-51387

Trust: 0.1

db:PACKETSTORMid:106874

Trust: 0.1

db:PACKETSTORMid:106986

Trust: 0.1

db:PACKETSTORMid:106896

Trust: 0.1

sources: VULHUB: VHN-51387 // BID: 50575 // JVNDB: JVNDB-2011-002840 // PACKETSTORM: 106874 // PACKETSTORM: 106986 // PACKETSTORM: 106896 // CNNVD: CNNVD-201111-239 // NVD: CVE-2011-3442

REFERENCES

url:http://support.apple.com/kb/ht5052

Trust: 1.9

url:http://lists.apple.com/archives/security-announce/2011/nov/msg00001.html

Trust: 1.7

url:http://www.securitytracker.com/id?1026287

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3442

Trust: 0.8

url:http://jvn.jp/cert/jvnvu988283

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3442

Trust: 0.8

url:http://secunia.com/advisories/46747

Trust: 0.6

url:http://secunia.com/advisories/46836

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18172

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18170

Trust: 0.6

url:http://www.apple.com

Trust: 0.3

url:http://www.forbes.com/sites/andygreenberg/2011/11/07/iphone-security-bug-lets-innocent-looking-apps-go-bad/

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/resources/events/sc_2011/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/46836/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46836

Trust: 0.1

url:http://secunia.com/advisories/46836/#comments

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3441

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3246

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3439

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3442

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=46747

Trust: 0.1

url:http://secunia.com/advisories/46747/#comments

Trust: 0.1

url:http://secunia.com/advisories/46747/

Trust: 0.1

sources: VULHUB: VHN-51387 // BID: 50575 // JVNDB: JVNDB-2011-002840 // PACKETSTORM: 106874 // PACKETSTORM: 106986 // PACKETSTORM: 106896 // CNNVD: CNNVD-201111-239 // NVD: CVE-2011-3442

CREDITS

Charlie Miller

Trust: 0.3

sources: BID: 50575

SOURCES

db:VULHUBid:VHN-51387
db:BIDid:50575
db:JVNDBid:JVNDB-2011-002840
db:PACKETSTORMid:106874
db:PACKETSTORMid:106986
db:PACKETSTORMid:106896
db:CNNVDid:CNNVD-201111-239
db:NVDid:CVE-2011-3442

LAST UPDATE DATE

2025-04-11T21:20:56.522000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-51387date:2012-02-15T00:00:00
db:BIDid:50575date:2011-11-15T00:51:00
db:JVNDBid:JVNDB-2011-002840date:2011-11-15T00:00:00
db:CNNVDid:CNNVD-201111-239date:2011-11-14T00:00:00
db:NVDid:CVE-2011-3442date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-51387date:2011-11-11T00:00:00
db:BIDid:50575date:2011-11-07T00:00:00
db:JVNDBid:JVNDB-2011-002840date:2011-11-15T00:00:00
db:PACKETSTORMid:106874date:2011-11-11T04:46:32
db:PACKETSTORMid:106986date:2011-11-15T05:08:20
db:PACKETSTORMid:106896date:2011-11-12T02:51:34
db:CNNVDid:CNNVD-201111-239date:2011-11-14T00:00:00
db:NVDid:CVE-2011-3442date:2011-11-11T18:55:01.333