VARIoT IoT vulnerabilities database
| VAR-201209-0386 | CVE-2012-3747 | Apple iOS 6 Used in less than WebKit Vulnerable to arbitrary code execution |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
WebKit, as used in Apple iOS before 6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. WebKit is prone to an unspecified remote code-execution vulnerability.
Few technical details are currently available. We will update this BID when more information emerges.
Successful attacks will result in arbitrary code execution; failed attacks may cause denial-of-service conditions.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it.
This issue is fixed in iOS 6. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. There is a vulnerability in using WebKit in versions prior to Apple iOS 6
| VAR-201209-0384 | CVE-2012-3745 | Apple iOS 6 Service disruption in less than (DoS) Vulnerabilities |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Off-by-one error in Telephony in Apple iOS before 6 allows remote attackers to cause a denial of service (buffer overflow and connectivity outage) via a crafted user-data header in an SMS message. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an off-by-one buffer-overflow vulnerability.
Successfully exploiting this issue allows remote attackers to cause the affected device to crash.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0382 | CVE-2012-3743 | Apple iOS 6 Vulnerabilities that capture important information in the implementation of less than system logs |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The System Logs implementation in Apple iOS before 6 does not restrict /var/log access by sandboxed apps, which allows remote attackers to obtain sensitive information via a crafted app that reads log files. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability.
Attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A vulnerability exists in Apple's System Logs implementation in versions prior to iOS 6. The vulnerability stems from unrestricted /var/log access to sandboxed applets
| VAR-201209-0381 | CVE-2012-3742 | Apple iOS 6 Less than Safari In https Vulnerability spoofed connection |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
Safari in Apple iOS before 6 does not properly restrict use of an unspecified Unicode character that looks similar to the https lock indicator, which allows remote attackers to spoof https connections by placing this character in the TITLE element of a web page. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a spoofing vulnerability.
Attackers may exploit this issue to spoof secure sites and create a false sense of trust. Successfully exploiting this issue may aid in phishing attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0379 | CVE-2012-3740 | Apple iOS 6 Vulnerabilities that can bypass passcode requests in less than passcode lock implementations |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Passcode Lock implementation in Apple iOS before 6 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A proximity attacker could exploit this vulnerability to bypass certain password requirements via an unidentified vector
| VAR-201209-0380 | CVE-2012-3741 | Apple iOS 6 In the implementation of restrictions less than Apple ID Vulnerabilities that bypass the authentication step |
CVSS V2: 1.9 CVSS V3: - Severity: LOW |
The Restrictions (aka Parental Controls) implementation in Apple iOS before 6 does not properly handle purchase attempts after a Disable Restrictions action, which allows local users to bypass an intended Apple ID authentication step via an app that performs purchase transactions. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A vulnerability exists in Apple's implementation of Restrictions (aka Parental Controls) in versions prior to iOS 6
| VAR-201209-0378 | CVE-2012-3739 | Apple iOS 6 Passcode Requirement Vulnerability in Implementation of Passcode Lock with Less Than |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Passcode Lock implementation in Apple iOS before 6 allows physically proximate attackers to bypass an intended passcode requirement via vectors involving use of the camera. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0376 | CVE-2012-3737 | Apple iOS 6 Vulnerability to display arbitrary saved photos in less than passcode lock implementation |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Passcode Lock implementation in Apple iOS before 6 does not properly restrict photo viewing, which allows physically proximate attackers to view arbitrary stored photos by spoofing a time value. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security weakness.
An attacker with physical access to the affected device can exploit this issue to access user information.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0375 | CVE-2012-3736 | Apple iOS 6 Vulnerable to bypassing passcode requests in less than passcode lock implementations |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
The Passcode Lock implementation in Apple iOS before 6 allows physically proximate attackers to bypass an intended passcode requirement via vectors related to ending a FaceTime call. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0377 | CVE-2012-3738 | Apple iOS 6 Vulnerability that bypasses access restrictions in less than passcode lock implementation |
CVSS V2: 3.6 CVSS V3: - Severity: LOW |
The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voice Dialing, or obtain sensitive contact information by attempting to make a FaceTime call and reading the contact suggestions. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security weakness.
An attacker with physical access to the affected device can exploit this issue to perform unauthorized actions and access user information.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0373 | CVE-2012-3734 | Apple iOS 6 Less than Office Viewer In Data Protection Vulnerabilities that are bypassed by level or encryption |
CVSS V2: 1.9 CVSS V3: - Severity: LOW |
Office Viewer in Apple iOS before 6 writes cleartext document data to a temporary file, which might allow local users to bypass a document's intended (1) Data Protection level or (2) encryption state by reading the temporary content. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a local information-disclosure vulnerability.
Local attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0374 | CVE-2012-3735 | Apple iOS 6 Vulnerabilities that allow you to view third-party applications used in the implementation of less than passcode lock |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
The Passcode Lock implementation in Apple iOS before 6 does not properly interact with the "Slide to Power Off" feature, which allows physically proximate attackers to see the most recently used third-party app by watching the device's screen. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security weakness.
An attacker with physical access to the affected device can exploit this issue to access user information.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0371 | CVE-2012-3732 | Apple iOS Forgery of signed content in email |
CVSS V2: 6.4 CVSS V3: - Severity: MEDIUM |
Mail in Apple iOS before 6 uses an S/MIME message's From address as the displayed sender address, which allows remote attackers to spoof signed content via an e-mail message in which the From field does not match the signer's identity. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a spoofing vulnerability that affects the 'Mail' component.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. The vulnerability stems from the use of the sender address of S/MIME messages to display the sender's address
| VAR-201209-0370 | CVE-2012-3731 | Apple iOS Vulnerabilities that can bypass passcode requests in email |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Mail in Apple iOS before 6 does not properly implement the Data Protection feature for e-mail attachments, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability. This may aid in further attacks.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A proximity attacker could exploit this vulnerability to bypass specially crafted password requirements via an unidentified vector
| VAR-201209-0372 | CVE-2012-3733 | Apple iOS 6 Vulnerabilities that can capture important information in messages less than |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Messages in Apple iOS before 6, when multiple iMessage e-mail addresses are configured, does not ensure that a reply's sender address matches the recipient address of the original message, which allows remote attackers to obtain potentially sensitive information about alternate e-mail addresses in opportunistic circumstances by reading a reply. TheBy reading the reply email, a third party may obtain important information about other email addresses. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability.
Attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0369 | CVE-2012-3730 | Apple iOS Forged file attachment vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Mail in Apple iOS before 6 does not properly handle reuse of Content-ID header values, which allows remote attackers to spoof attachments via a header value that was also used in a previous e-mail message, as demonstrated by a message from a different sender. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability.
An attacker can exploit this issue to bypass certain security restrictions by spoofing email attachments, allowing the attacker to perform malicious activities. Other attacks may also be possible.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0367 | CVE-2012-3728 | Apple iOS Privileged vulnerability in Kernel |
CVSS V2: 6.9 CVSS V3: - Severity: MEDIUM |
The kernel in Apple iOS before 6 dereferences invalid pointers during the handling of packet-filter data structures, which allows local users to gain privileges via a crafted program that makes packet-filter ioctl calls. Apple iOS for the iPhone, the iPod touch, andthe iPad is prone to a local privilege-escalation vulnerability that affects the kernel.
Local attackers can exploit this issue to alter kernel memory and execute arbitrary code with system-level privileges.
Successfully exploiting this issue can allow attackers to elevate privileges, leading to a complete compromise of the device.
This issue is fixed in Apple iOS 6 version.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it
| VAR-201209-0368 | CVE-2012-3729 | Apple iOS Vulnerabilities in which important information is obtained in the kernel |
CVSS V2: 1.9 CVSS V3: - Severity: LOW |
The Berkeley Packet Filter (BPF) interpreter implementation in the kernel in Apple iOS before 6 accesses uninitialized memory locations, which allows local users to obtain sensitive information about the layout of kernel memory via a crafted program that uses a BPF interface. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability.
An attacker can exploit this issue to view content from the kernel memory. This may allow the attacker to obtain sensitive information or aid in further attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. The vulnerability stems from accessing uninitialized memory locations
| VAR-201209-0366 | CVE-2012-3727 | Apple iOS of IPsec Component buffer overflow vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Buffer overflow in the IPsec component in Apple iOS before 6 allows remote attackers to execute arbitrary code via a crafted racoon configuration file. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a buffer-overflow vulnerability.
Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of the affected application. Failed exploit attempts may cause denial-of-service conditions.
NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
| VAR-201209-0363 | CVE-2012-3724 | Apple iOS of CFNetwork Vulnerability in which important information is obtained |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
CFNetwork in Apple iOS before 6 does not properly identify the host portion of a URL, which allows remote attackers to obtain sensitive information by leveraging the construction of an HTTP request with an incorrect hostname derived from a malformed URL. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability.
Attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks.
Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A vulnerability exists in CFNetwork in versions prior to Apple iOS 6 due to partial URLs not correctly identifying hosts