ID

VAR-201311-0289


CVE

CVE-2013-5193


TITLE

Apple iOS of App Store Vulnerability in completing app purchases or in-app purchases in components

Trust: 0.8

sources: JVNDB: JVNDB-2013-005128

DESCRIPTION

The App Store component in Apple iOS before 7.0.4 does not properly enforce an intended transaction-time password requirement, which allows local users to complete a (1) App purchase or (2) In-App purchase by leveraging previous entry of Apple ID credentials. Attackers with physical access to device can exploit this issue to bypass certain security restrictions and perform unauthorized actions; this may aid in launching further attacks. Versions prior to Apple iOS 7.0.4 are vulnerable. It allows users to browse and download some applications developed by iOS SDK or Mac SDK through the iTunes Store platform. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-11-14-1 iOS 7.0.4 iOS 7.0.4 is now available and addresses the following: App Store Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: App and In-App purchases may be completed with insufficient authorization Description: A signed-in user may be able to complete a transaction without providing a password when prompted. This issue was addressed by additional enforcement of purchase authorization. CVE-ID CVE-2013-5193 Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "7.0.4". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJSg/3rAAoJEPefwLHPlZEwrmwQALOZgzGi4w65EqFokRc/CPdi qLnSiSdi8IyoZ2y//v2jiTiOoI7F+3ugf1HgYGcZFt+1d20y37QnlKYqEDU3z2O7 J3YuKj8qF9IrdZUOMzmirbfizxLI1+4egJj0iDGHWkylTK03y7GPAjTxhUItk6D+ rzaXOH6uqKrNEo3zFSU7QGx7Sn9dCg8xUoV6gD+wDwsB8Bqu2Qh1hkWAer10+0SF TuMpENhuHtUg++y6msoh+Q77Wj37tXV0WlGgwAMFeHUtqgVKpw2dHOugUUFFoE4l 8MatQxvLzW2P0YkbSDgbhbfrz0Op2isnfuHbTSNrUWYhs+pvgb6Zh0SlKQSC2aqa rxTCxk5TG+OFiX4TOAGnEhcQMAvWmLEy/z/HtRIoduhdviL1ysFP3aaDqvE34YjD DRgTRoFuENpqsx1a07pcA47xNogY6pMd8X5/EnvJKKEjSlCvnqlyApXX2U8Bg3Om fA6f7YJQi/7e3/eCdYDY0uam896vk8hXoiqhV/PmCbs2kCoesWWUF6T80uqUtEzQ do/guugRHR4gcqyjrnSAFjLaYG1JYWT+wsYtPVwpw4ZBkICIyn6NZ3vjMGN64mCi wQA0p57TdIeM6z37yxTmzDwwSJE0nNd0XS7AWGY0+r78gezyKbssAaljHhBfjRTG ucZNjTlJ1QL7WoFsqeM1 =erop -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2013-5193 // JVNDB: JVNDB-2013-005128 // BID: 63723 // VULHUB: VHN-65195 // PACKETSTORM: 124027

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:7.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:7.0.2

Trust: 1.6

vendor:applemodel:iphone osscope:lteversion:7.0.3

Trust: 1.0

vendor:applemodel:iosscope:ltversion:7.0.4 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7.0.4 (iphone 4 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7.0.4 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:7.0.3

Trust: 0.6

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:4.0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iosscope:neversion:7.0.4

Trust: 0.3

sources: BID: 63723 // JVNDB: JVNDB-2013-005128 // CNNVD: CNNVD-201311-230 // NVD: CVE-2013-5193

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-5193
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-5193
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201311-230
value: MEDIUM

Trust: 0.6

VULHUB: VHN-65195
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-5193
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:N/I:C/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-65195
severity: MEDIUM
baseScore: 4.7
vectorString: AV:L/AC:M/AU:N/C:N/I:C/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: NONE
exploitabilityScore: 3.4
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-65195 // JVNDB: JVNDB-2013-005128 // CNNVD: CNNVD-201311-230 // NVD: CVE-2013-5193

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-65195 // JVNDB: JVNDB-2013-005128 // NVD: CVE-2013-5193

THREAT TYPE

local

Trust: 0.9

sources: BID: 63723 // CNNVD: CNNVD-201311-230

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201311-230

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005128

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-65195

PATCH

title:APPLE-SA-2013-11-14-1url:http://lists.apple.com/archives/security-announce/2013/Nov/msg00000.html

Trust: 0.8

title:HT6058url:http://support.apple.com/kb/HT6058

Trust: 0.8

title:HT6058url:http://support.apple.com/kb/HT6058?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2013-005128

EXTERNAL IDS

db:NVDid:CVE-2013-5193

Trust: 2.9

db:JVNDBid:JVNDB-2013-005128

Trust: 0.8

db:CNNVDid:CNNVD-201311-230

Trust: 0.7

db:APPLEid:APPLE-SA-2013-11-14-1

Trust: 0.6

db:BIDid:63723

Trust: 0.4

db:PACKETSTORMid:124027

Trust: 0.2

db:SEEBUGid:SSVID-61074

Trust: 0.1

db:VULHUBid:VHN-65195

Trust: 0.1

sources: VULHUB: VHN-65195 // BID: 63723 // JVNDB: JVNDB-2013-005128 // PACKETSTORM: 124027 // CNNVD: CNNVD-201311-230 // NVD: CVE-2013-5193

REFERENCES

url:http://lists.apple.com/archives/security-announce/2013/nov/msg00000.html

Trust: 2.0

url:http://support.apple.com/kb/ht6058

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-5193

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-5193

Trust: 0.8

url:http://www.apple.com/ios/

Trust: 0.3

url:http://www.apple.com/ipad/

Trust: 0.3

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5193

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

sources: VULHUB: VHN-65195 // BID: 63723 // JVNDB: JVNDB-2013-005128 // PACKETSTORM: 124027 // CNNVD: CNNVD-201311-230 // NVD: CVE-2013-5193

CREDITS

Apple

Trust: 0.4

sources: BID: 63723 // PACKETSTORM: 124027

SOURCES

db:VULHUBid:VHN-65195
db:BIDid:63723
db:JVNDBid:JVNDB-2013-005128
db:PACKETSTORMid:124027
db:CNNVDid:CNNVD-201311-230
db:NVDid:CVE-2013-5193

LAST UPDATE DATE

2025-04-11T23:11:58.902000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-65195date:2013-11-20T00:00:00
db:BIDid:63723date:2015-03-19T08:27:00
db:JVNDBid:JVNDB-2013-005128date:2013-11-19T00:00:00
db:CNNVDid:CNNVD-201311-230date:2013-12-04T00:00:00
db:NVDid:CVE-2013-5193date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-65195date:2013-11-18T00:00:00
db:BIDid:63723date:2013-11-14T00:00:00
db:JVNDBid:JVNDB-2013-005128date:2013-11-19T00:00:00
db:PACKETSTORMid:124027date:2013-11-15T13:13:13
db:CNNVDid:CNNVD-201311-230date:2013-11-18T00:00:00
db:NVDid:CVE-2013-5193date:2013-11-18T02:55:09.750