VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201209-0386 CVE-2012-3747 Apple iOS 6 Used in less than WebKit Vulnerable to arbitrary code execution CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
WebKit, as used in Apple iOS before 6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. WebKit is prone to an unspecified remote code-execution vulnerability. Few technical details are currently available. We will update this BID when more information emerges. Successful attacks will result in arbitrary code execution; failed attacks may cause denial-of-service conditions. NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. This issue is fixed in iOS 6. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. There is a vulnerability in using WebKit in versions prior to Apple iOS 6
VAR-201209-0384 CVE-2012-3745 Apple iOS 6 Service disruption in less than (DoS) Vulnerabilities CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Off-by-one error in Telephony in Apple iOS before 6 allows remote attackers to cause a denial of service (buffer overflow and connectivity outage) via a crafted user-data header in an SMS message. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an off-by-one buffer-overflow vulnerability. Successfully exploiting this issue allows remote attackers to cause the affected device to crash. NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0382 CVE-2012-3743 Apple iOS 6 Vulnerabilities that capture important information in the implementation of less than system logs CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
The System Logs implementation in Apple iOS before 6 does not restrict /var/log access by sandboxed apps, which allows remote attackers to obtain sensitive information via a crafted app that reads log files. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability. Attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A vulnerability exists in Apple's System Logs implementation in versions prior to iOS 6. The vulnerability stems from unrestricted /var/log access to sandboxed applets
VAR-201209-0381 CVE-2012-3742 Apple iOS 6 Less than Safari In https Vulnerability spoofed connection CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Safari in Apple iOS before 6 does not properly restrict use of an unspecified Unicode character that looks similar to the https lock indicator, which allows remote attackers to spoof https connections by placing this character in the TITLE element of a web page. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a spoofing vulnerability. Attackers may exploit this issue to spoof secure sites and create a false sense of trust. Successfully exploiting this issue may aid in phishing attacks. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0379 CVE-2012-3740 Apple iOS 6 Vulnerabilities that can bypass passcode requests in less than passcode lock implementations CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Passcode Lock implementation in Apple iOS before 6 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability. Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A proximity attacker could exploit this vulnerability to bypass certain password requirements via an unidentified vector
VAR-201209-0380 CVE-2012-3741 Apple iOS 6 In the implementation of restrictions less than Apple ID Vulnerabilities that bypass the authentication step CVSS V2: 1.9
CVSS V3: -
Severity: LOW
The Restrictions (aka Parental Controls) implementation in Apple iOS before 6 does not properly handle purchase attempts after a Disable Restrictions action, which allows local users to bypass an intended Apple ID authentication step via an app that performs purchase transactions. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability. Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information. NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A vulnerability exists in Apple's implementation of Restrictions (aka Parental Controls) in versions prior to iOS 6
VAR-201209-0378 CVE-2012-3739 Apple iOS 6 Passcode Requirement Vulnerability in Implementation of Passcode Lock with Less Than CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Passcode Lock implementation in Apple iOS before 6 allows physically proximate attackers to bypass an intended passcode requirement via vectors involving use of the camera. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability. Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0376 CVE-2012-3737 Apple iOS 6 Vulnerability to display arbitrary saved photos in less than passcode lock implementation CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Passcode Lock implementation in Apple iOS before 6 does not properly restrict photo viewing, which allows physically proximate attackers to view arbitrary stored photos by spoofing a time value. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security weakness. An attacker with physical access to the affected device can exploit this issue to access user information. NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0375 CVE-2012-3736 Apple iOS 6 Vulnerable to bypassing passcode requests in less than passcode lock implementations CVSS V2: 4.6
CVSS V3: -
Severity: MEDIUM
The Passcode Lock implementation in Apple iOS before 6 allows physically proximate attackers to bypass an intended passcode requirement via vectors related to ending a FaceTime call. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability. Successful exploits can allow an attacker with physical access to a vulnerable device to perform unauthorized actions or obtain sensitive information. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0377 CVE-2012-3738 Apple iOS 6 Vulnerability that bypasses access restrictions in less than passcode lock implementation CVSS V2: 3.6
CVSS V3: -
Severity: LOW
The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voice Dialing, or obtain sensitive contact information by attempting to make a FaceTime call and reading the contact suggestions. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security weakness. An attacker with physical access to the affected device can exploit this issue to perform unauthorized actions and access user information. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0373 CVE-2012-3734 Apple iOS 6 Less than Office Viewer In Data Protection Vulnerabilities that are bypassed by level or encryption CVSS V2: 1.9
CVSS V3: -
Severity: LOW
Office Viewer in Apple iOS before 6 writes cleartext document data to a temporary file, which might allow local users to bypass a document's intended (1) Data Protection level or (2) encryption state by reading the temporary content. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a local information-disclosure vulnerability. Local attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0374 CVE-2012-3735 Apple iOS 6 Vulnerabilities that allow you to view third-party applications used in the implementation of less than passcode lock CVSS V2: 2.1
CVSS V3: -
Severity: LOW
The Passcode Lock implementation in Apple iOS before 6 does not properly interact with the "Slide to Power Off" feature, which allows physically proximate attackers to see the most recently used third-party app by watching the device's screen. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security weakness. An attacker with physical access to the affected device can exploit this issue to access user information. NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0371 CVE-2012-3732 Apple iOS Forgery of signed content in email CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Mail in Apple iOS before 6 uses an S/MIME message's From address as the displayed sender address, which allows remote attackers to spoof signed content via an e-mail message in which the From field does not match the signer's identity. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a spoofing vulnerability that affects the 'Mail' component. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. The vulnerability stems from the use of the sender address of S/MIME messages to display the sender's address
VAR-201209-0370 CVE-2012-3731 Apple iOS Vulnerabilities that can bypass passcode requests in email CVSS V2: 2.1
CVSS V3: -
Severity: LOW
Mail in Apple iOS before 6 does not properly implement the Data Protection feature for e-mail attachments, which allows physically proximate attackers to bypass an intended passcode requirement via unspecified vectors. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability. This may aid in further attacks. NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A proximity attacker could exploit this vulnerability to bypass specially crafted password requirements via an unidentified vector
VAR-201209-0372 CVE-2012-3733 Apple iOS 6 Vulnerabilities that can capture important information in messages less than CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Messages in Apple iOS before 6, when multiple iMessage e-mail addresses are configured, does not ensure that a reply's sender address matches the recipient address of the original message, which allows remote attackers to obtain potentially sensitive information about alternate e-mail addresses in opportunistic circumstances by reading a reply. TheBy reading the reply email, a third party may obtain important information about other email addresses. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability. Attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0369 CVE-2012-3730 Apple iOS Forged file attachment vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
Mail in Apple iOS before 6 does not properly handle reuse of Content-ID header values, which allows remote attackers to spoof attachments via a header value that was also used in a previous e-mail message, as demonstrated by a message from a different sender. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a security-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions by spoofing email attachments, allowing the attacker to perform malicious activities. Other attacks may also be possible. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0367 CVE-2012-3728 Apple iOS Privileged vulnerability in Kernel CVSS V2: 6.9
CVSS V3: -
Severity: MEDIUM
The kernel in Apple iOS before 6 dereferences invalid pointers during the handling of packet-filter data structures, which allows local users to gain privileges via a crafted program that makes packet-filter ioctl calls. Apple iOS for the iPhone, the iPod touch, andthe iPad is prone to a local privilege-escalation vulnerability that affects the kernel. Local attackers can exploit this issue to alter kernel memory and execute arbitrary code with system-level privileges. Successfully exploiting this issue can allow attackers to elevate privileges, leading to a complete compromise of the device. This issue is fixed in Apple iOS 6 version. NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it
VAR-201209-0368 CVE-2012-3729 Apple iOS Vulnerabilities in which important information is obtained in the kernel CVSS V2: 1.9
CVSS V3: -
Severity: LOW
The Berkeley Packet Filter (BPF) interpreter implementation in the kernel in Apple iOS before 6 accesses uninitialized memory locations, which allows local users to obtain sensitive information about the layout of kernel memory via a crafted program that uses a BPF interface. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability. An attacker can exploit this issue to view content from the kernel memory. This may allow the attacker to obtain sensitive information or aid in further attacks. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. The vulnerability stems from accessing uninitialized memory locations
VAR-201209-0366 CVE-2012-3727 Apple iOS of IPsec Component buffer overflow vulnerability CVSS V2: 6.8
CVSS V3: -
Severity: MEDIUM
Buffer overflow in the IPsec component in Apple iOS before 6 allows remote attackers to execute arbitrary code via a crafted racoon configuration file. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to a buffer-overflow vulnerability. Successfully exploiting this issue may allow attackers to execute arbitrary code in the context of the affected application. Failed exploit attempts may cause denial-of-service conditions. NOTE: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices
VAR-201209-0363 CVE-2012-3724 Apple iOS of CFNetwork Vulnerability in which important information is obtained CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
CFNetwork in Apple iOS before 6 does not properly identify the host portion of a URL, which allows remote attackers to obtain sensitive information by leveraging the construction of an HTTP request with an incorrect hostname derived from a malformed URL. Apple iOS for the iPhone, the iPod touch, and the iPad is prone to an information-disclosure vulnerability. Attackers can leverage this issue to gain access to sensitive information. Information obtained may aid in further attacks. Note: This issue was previously discussed in BID 55612 (Apple iPhone/iPad/iPod touch Prior to iOS 6 Multiple Vulnerabilities) but has been given its own record to better document it. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. A vulnerability exists in CFNetwork in versions prior to Apple iOS 6 due to partial URLs not correctly identifying hosts