VARIoT IoT vulnerabilities database

VAR-200710-0017 | CVE-2007-5382 | CiscoWorks WLSE Vulnerabilities that can be obtained in a conversion utility that converts files |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The conversion utility for converting CiscoWorks Wireless LAN Solution Engine (WLSE) 4.1.91.0 and earlier to Cisco Wireless Control System (WCS) creates administrator accounts with default usernames and passwords, which allows remote attackers to gain privileges. Cisco Wireless Control System is prone to a vulnerability that permits an attacker to gain unauthorized administrative access to the affected device. This issue is being tracked by Cisco Bug ID CSCsj71081
An attacker could exploit this issue to gain unauthorized administrative access to the affected device. Successfully exploiting this issue will result in the complete compromise of the affected device.
This issue affects Cisco Wireless Control System 4.1.91.0 and prior versions. Since there is no requirement to change these credentials during the transition, attackers can use these accounts with default credentials to gain full administrative control over WCS after transition
VAR-200710-0565 | No CVE | Cisco IOS Multiple Unspecified Stack Overflow Vulnerabilities |
CVSS V2: - CVSS V3: - Severity: - |
Cisco IOS is prone to multiple unspecified stack-overflow vulnerabilities.
A successful attack may allow the attacker to execute arbitrary code and gain unauthorized access to the device. The attacker can also leverage this issue to cause an affected device to reload, denying service to legitimate users.
The researchers responsible for these discoveries have stated that there are numerous other IOS security issues that will be released in the near future.
NOTE: Judging by the limited information in the security advisory that induced this alert, we assume that all of Cisco IOS 12.x and IOS XR versions are affected by these issues. We cannot verify this at this time. We will update this information when more details emerge.
VAR-200710-0057 | CVE-2007-5411 | Linksys SPA941 VoIP Phone Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in the Linksys SPA941 VoIP Phone with firmware 5.1.8 allows remote attackers to inject arbitrary web script or HTML via the From header in a SIP message. Linksys SPA941 devices are prone to an HTML-injection vulnerability because the built-in webserver fails to properly sanitize user-supplied input before using it in dynamically generated content.
Attacker-supplied HTML and script code would execute in the context of the affected website, potentially allowing an attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user; other attacks are also possible.
Linksys SPA941 devices with firmware version 5.1.8 are vulnerable; other versions may also be affected.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Linksys SPA941 Script Insertion Vulnerability
SECUNIA ADVISORY ID:
SA27116
VERIFY ADVISORY:
http://secunia.com/advisories/27116/
CRITICAL:
Moderately critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
OPERATING SYSTEM:
Linksys SPA941 VoIP Phone
http://secunia.com/product/14032/
DESCRIPTION:
Radu State has reported a vulnerability in Linksys SPA941, which can
be exploited by malicious people to conduct script insertion
attacks.
Input passed via the "From" field in a SIP message is not properly
sanitised before being displayed in the integrated web interface of
the device.
SOLUTION:
Do not use the call history in the integrated web interface.
PROVIDED AND/OR DISCOVERED BY:
Radu State
ORIGINAL ADVISORY:
http://lists.grok.org.uk/pipermail/full-disclosure/2007-October/066430.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200710-0145 | CVE-2007-5366 | plural Fujitsu Interstage Vulnerabilities in which important information is obtained in products |
CVSS V2: 5.0 CVSS V3: - Severity: MEDIUM |
The Tomcat 4.1-based Servlet Service in Fujitsu Interstage Application Server 7.0 through 9.0.0 and Interstage Apworks/Studio 7.0 through 9.0.0 allows remote attackers to obtain sensitive information (web root path) via unspecified vectors that trigger an error message, probably related to enabling the useCanonCaches Java Virtual Machine (JVM) option. Interstage Application Server is prone to a path-disclosure vulnerability.
Exploiting this issue can allow an attacker to access sensitive data that may be used to launch further attacks against a vulnerable computer.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Interstage Application Server Full Path Disclosure Weakness
SECUNIA ADVISORY ID:
SA27136
VERIFY ADVISORY:
http://secunia.com/advisories/27136/
CRITICAL:
Not critical
IMPACT:
Exposure of system information
WHERE:
>From remote
SOFTWARE:
Interstage Application Server 7.x
http://secunia.com/product/13692/
Interstage Application Server 8.x
http://secunia.com/product/13685/
Interstage Application Server 9.x
http://secunia.com/product/15986/
Interstage Apworks 7.x
http://secunia.com/product/13689/
Interstage Apworks 8.x
http://secunia.com/product/15987/
Interstage Studio 8.x
http://secunia.com/product/13690/
Interstage Studio 9.x
http://secunia.com/product/15610/
DESCRIPTION:
A weakness has been reported in Interstage Application Server, which
can be exploited by malicious people to disclose system information.
The weakness is caused due to the full web server path being
disclosed in error messages when performing certain unspecified
actions on the web server.
Please see the vendor advisory for a list of affected products.
SOLUTION:
The vendor will reportedly address this issue in future versions.
PROVIDED AND/OR DISCOVERED BY:
Reported by the vendor.
ORIGINAL ADVISORY:
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200705e.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200711-0147 | CVE-2007-6003 |
Thomson SpeedTouch 716 of cgi/b/ic/connect Vulnerable to cross-site scripting
Related entries in the VARIoT exploits database: VAR-E-200710-0094 |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in cgi/b/ic/connect in the Thomson SpeedTouch 716 with firmware 5.4.0.14 allows remote attackers to inject arbitrary web script or HTML via the url parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. BT Home Hub and Thomson/Alcatel Speedtouch 7G routers are prone to multiple web-interface vulnerabilities, including a cross-site request-forgery issue, a cross-site scripting issue, multiple HTML-injection issues, and multiple authentication-bypass issues.
Successful exploits of many of these issues will allow an attacker to completely compromise the affected device.
These issues affect the BT Home Hub and Thomson/Alcatel Speedtouch 7G routers.
----------------------------------------------------------------------
2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.
Input passed to the "url" parameter in /cgi/b/ic/connect/ is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.
The vulnerability is reported in firmware version 5.4.0.14. Other
versions may also be affected.
SOLUTION:
Do not browse untrusted websites or follow untrusted links.
PROVIDED AND/OR DISCOVERED BY:
Remco
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200710-0018 | CVE-2007-5383 |
BT Home Hub Used in Thomson/Alcatel SpeedTouch 7G Vulnerability to gain administrator access on router
Related entries in the VARIoT exploits database: VAR-E-200710-0094 |
CVSS V2: 10.0 CVSS V3: - Severity: HIGH |
The Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allows remote attackers on an intranet to bypass authentication and gain administrative access via vectors including a '/' (slash) character at the end of the PATH_INFO to cgi/b, aka "double-slash auth bypass." NOTE: remote attackers outside the intranet can exploit this by leveraging a separate CSRF vulnerability. NOTE: SpeedTouch 780 might also be affected by some of these issues. BT Home Hub and Speedtouch 7G are both home wireless Internet routers.
Multiple security vulnerabilities exist in BT Home Hub and SpeedTouch 7G routers, allowing malicious users to perform cross-site footsteps, cross-site request spoofing, script injection attacks, or bypass certain security restrictions.
1) Input validation errors when processing URLs may allow attackers to access and change password-protected resources, such as configuration and settings pages, through specially crafted URLs containing two slashes.
2) Failure to perform proper filtering before recording the login user name may allow the injection of arbitrary HTML and script code. If the user browses the log, it will be executed in the user's browser session.
3) As the input to the name parameter is not properly filtered, arbitrary HTML and script code may be executed in the user's browser session.
4) Failure to properly filter the input of url parameters in the cgi / b / ic / connect / file may result in the execution of arbitrary HTML and script code in the user's browser session.
5) The device does not perform validity checks on user requests, allowing users to perform certain operations through HTTP requests. If the logged-in administrator visits a malicious site, this may cause the administrator password to be changed.
6) Users can directly access certain pages, such as the Wireless Security page, through the URL without authentication.
7) The administrative user can save the backup or load the configuration file through the URL, and these files should only be accessed by the tech account.
Successful exploits of many of these issues will allow an attacker to completely compromise the affected device. NOTE: '/' (slash) vectors are covered by CVE-2007-5383
VAR-200710-0019 | CVE-2007-5384 |
BT Home Hub Used in Thomson/Alcatel SpeedTouch 7G Cross-site request forgery vulnerability in router
Related entries in the VARIoT exploits database: VAR-E-200710-0094 |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site request forgery (CSRF) vulnerabilities in the Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allow remote attackers to perform actions as administrators via unspecified POST requests, as demonstrated by enabling an inbound remote-assistance HTTPS session on TCP port 51003. NOTE: an authentication bypass can be leveraged to exploit this in the absence of an existing administrative session. NOTE: SpeedTouch 780 might also be affected by some of these issues. BT Home Hub and Thomson/Alcatel Speedtouch 7G routers are prone to multiple web-interface vulnerabilities, including a cross-site request-forgery issue, a cross-site scripting issue, multiple HTML-injection issues, and multiple authentication-bypass issues.
Successful exploits of many of these issues will allow an attacker to completely compromise the affected device.
These issues affect the BT Home Hub and Thomson/Alcatel Speedtouch 7G routers
VAR-200710-0020 | CVE-2007-5385 |
BT Home Hub Used in etc. Thomson/Alcatel SpeedTouch 7G Router cross-site scripting vulnerability
Related entries in the VARIoT exploits database: VAR-E-200710-0094 |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in the Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. BT Home Hub Used in etc.
Successful exploits of many of these issues will allow an attacker to completely compromise the affected device
VAR-200710-0194 | CVE-2007-5214 | AXIS 2100 Network Camera Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware 2.43 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to the default URI associated with a directory, as demonstrated by (a) the root directory and (b) the view/ directory; (2) parameters associated with saved settings, as demonstrated by (c) the conf_Network_HostName parameter on the Network page and (d) the conf_Layout_OwnTitle parameter to ServerManager.srv; and (3) the query string to ServerManager.srv, which is displayed on the logs page. NOTE: an attacker can leverage a CSRF vulnerability to modify saved settings. (1) The default associated with the directory URI Against PATH_INFO (2) Parameters related to saved settings (3) ServerManager.srv Query string for. 2100 Network Camera is prone to a cross-site scripting vulnerability. The query string of srv will be displayed on the page
VAR-200710-0192 | CVE-2007-5212 | AXIX 2100 Network Camera Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Multiple cross-site scripting (XSS) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware before 2.43 allow remote attackers to inject arbitrary web script or HTML via (1) parameters associated with saved settings, as demonstrated by the conf_SMTP_MailServer1 parameter to ServerManager.srv; or (2) the subpage parameter to wizard/first/wizard_main_first.shtml. NOTE: an attacker can leverage a CSRF vulnerability to modify saved settings.
Exploiting these issues could allow an attacker to execute arbitrary script code in the context of the webserver process, control how the site is rendered to the user, compromise the application, obtain sensitive information, and access or modify data.
These issues affect 2100 Network Cameras with firmware version 2.43; other firmware versions and models may also be affected
VAR-200710-0193 | CVE-2007-5213 | AXIX 2100 Network Camera Vulnerable to cross-site scripting |
CVSS V2: 9.3 CVSS V3: - Severity: HIGH |
Multiple cross-site request forgery (CSRF) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware 2.43 and earlier allow remote attackers to perform actions as administrators, as demonstrated by (1) an SMTP server change through the conf_SMTP_MailServer1 parameter to ServerManager.srv and (2) a hostname change through the conf_Network_HostName parameter on the Network page. AXIX 2100 Network Camera Contains a cross-site scripting vulnerability.An action could be taken by a third party as an administrator. Axis Communications 2100 Network Camera is prone to multiple input-validation vulnerabilities, including a cross-site scripting issue, multiple HTML-injection issues, and a cross-site request-forgery issue, because the application fails to properly sanitize user-supplied input.
Exploiting these issues could allow an attacker to execute arbitrary script code in the context of the webserver process, control how the site is rendered to the user, compromise the application, obtain sensitive information, and access or modify data.
These issues affect 2100 Network Cameras with firmware version 2.43; other firmware versions and models may also be affected
VAR-200710-0282 | CVE-2007-5143 | F-Secure Anti-Virus Vulnerable to virus scanning |
CVSS V2: 1.9 CVSS V3: - Severity: LOW |
F-Secure Anti-Virus for Windows Servers 7.0 64-bit edition allows local users to bypass virus scanning by using the system32 directory to store a crafted (1) archive or (2) packed executable. NOTE: in many environments, this does not cross privilege boundaries because any process able to write to system32 could also shut off F-Secure Anti-Virus. F-Secure Anti-Virus for Windows Servers is prone to a vulnerability that may allow certain malware to bypass detection.
An attacker may exploit this issue by placing maliciously crafted archives or packed executables in specific locations on a victim's computer.
Successful exploits will allow attackers to place on the computer malicious code that the antivirus application will fail to detect. If this code is subsequently run, this may result in a malware infection.
F-Secure Anti-Virus for Windows Servers 7.0 is affected by this issue.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
F-Secure Archives and Packed Executables Detection Bypass
SECUNIA ADVISORY ID:
SA26948
VERIFY ADVISORY:
http://secunia.com/advisories/26948/
CRITICAL:
Not critical
IMPACT:
Security Bypass
WHERE:
>From remote
SOFTWARE:
F-Secure Anti-Virus for Windows Servers 7.x
http://secunia.com/product/14382/
DESCRIPTION:
A vulnerability has been reported in F-Secure Anti-Virus, which can
be exploited by malware to bypass the scanning functionality.
The vulnerability only affects 64-bit server platforms.
SOLUTION:
Apply patch.
ftp://ftp.f-secure.com/support/hotfix/fsav/fsav720-01-signed.fsfix
PROVIDED AND/OR DISCOVERED BY:
The vendor credits Mr Papadorotheoun.
ORIGINAL ADVISORY:
http://www.f-secure.com/security/fsc-2007-6.shtml
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200709-0150 | CVE-2007-3761 | Apple iPhone of Safari Cross-site scripting vulnerability in frames |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Safari in Apple iPhone 1.1.1 allows remote attackers to inject arbitrary web script or HTML by causing Javascript events to be applied to a frame in another domain. Apple iPhone is prone to a vulnerability that lets attackers bypass the same-origin policy.
Attackers can exploit this issue to execute arbitrary JavaScript in the context of another domain.
Versions prior to iPhone 1.1.1 are vulnerable.
NOTE: This issue was initially disclosed along with several other issues in BID 25834 (Apple iPhone 1.1.1 Update Multiple Security Vulnerabilities). Each issue has been assigned its own BID to better document the details. Apple iPhone is a smart phone of Apple (Apple). There is a cross-site scripting vulnerability in the Safari browser embedded in the iPhone.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Apple iPhone Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA26983
VERIFY ADVISORY:
http://secunia.com/advisories/26983/
CRITICAL:
Moderately critical
IMPACT:
Hijacking, Security Bypass, Cross Site Scripting, Exposure of
sensitive information, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple iPhone 1.x
http://secunia.com/product/15128/
DESCRIPTION:
Some vulnerabilities, security issues, and a weakness have been
reported in the Apple iPhone, which can be exploited by malicious
people to conduct cross-site scripting attacks, disclose sensitive
information, bypass certain security restrictions, cause a DoS
(Denial of Service), or to compromise a vulnerable system.
1) An input validation error when handling SDP (Service Discovery
Protocol) packets exists in the iPhone's Bluetooth server. This can
be exploited by an attacker in Bluetooth range to cause the
application to crash or to execute arbitrary code by sending
specially crafted SDP packets.
Successful exploitation requires that Bluetooth is enabled.
2) The problem is that users are not notified about changes of mail
servers' identities when Mail is configured to use SSL for incoming
and outgoing connections. This can be exploited e.g. to impersonate
the user's mail server and obtain the user's email credentials.
Successful exploitation requires a MitM (Man-in-the-Middle) attack.
3) It is possible to cause the iPhone to call a phone number without
user confirmation by enticing a user to follow a "tel:" link in a
mail message.
4) An error in Safari in the handling of new browser windows can be
exploited to disclose the URL of an unrelated page.
For more information see vulnerability #2 in:
SA23893
5) An error in Safari in the handling of "tel:" links can be
exploited to cause the iPhone to dial a different number than the one
being displayed in the confirmation dialog. Exiting Safari during the
confirmation process may result in unintentional confirmation.
6) An error in Safari can be exploited to set Javascript window
properties of pages served from other websites when a malicious web
site is viewed.
7) Disabling Javascript in Safari does not take effect until Safari
is restarted.
8) An error in Safari allows a malicious website to bypass the
same-origin policy using "frame" tags.
9) An error in Safari allows Javascript events to be associated with
the wrong frame.
10) An error in Safari allows content served over HTTP to alter or
access content served over HTTPS in the same domain.
SOLUTION:
Update to version 1.1.1 (downloadable and installable via iTunes).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Kevin Mahaffey and John Hering of Flexilis Mobile Security
3) Andi Baritchi, McAfee
4) Michal Zalewski, Google Inc. and Secunia Research
5) Billy Hoffman and Bryan Sullivan of HP Security Labs (formerly SPI
Labs) and Eduardo Tang
6, 8) Michal Zalewski, Google Inc.
10) Keigo Yamazaki of LAC Co., Ltd.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=306586
OTHER REFERENCES:
SA23893:
http://secunia.com/advisories/23893/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200709-0148 | CVE-2007-3759 | Apple iPhone of Safari In Javascript That the setting of disabling the server will not be reflected until restart |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Safari in Apple iPhone 1.1.1, when requested to disable Javascript, does not disable it until Safari is restarted, which might leave Safari open to attacks that the user does not expect.
This issue can aid in the success of attacks that rely on JavaScript.
Versions prior to iPhone 1.1.1 are vulnerable.
NOTE: This issue was initially disclosed along with several other issues in BID 25834 (Apple iPhone 1.1.1 Update Multiple Security Vulnerabilities). Each issue has been assigned its own BID to better document the details. Apple iPhone is a smart phone of Apple (Apple).
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Apple iPhone Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA26983
VERIFY ADVISORY:
http://secunia.com/advisories/26983/
CRITICAL:
Moderately critical
IMPACT:
Hijacking, Security Bypass, Cross Site Scripting, Exposure of
sensitive information, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple iPhone 1.x
http://secunia.com/product/15128/
DESCRIPTION:
Some vulnerabilities, security issues, and a weakness have been
reported in the Apple iPhone, which can be exploited by malicious
people to conduct cross-site scripting attacks, disclose sensitive
information, bypass certain security restrictions, cause a DoS
(Denial of Service), or to compromise a vulnerable system.
1) An input validation error when handling SDP (Service Discovery
Protocol) packets exists in the iPhone's Bluetooth server. This can
be exploited by an attacker in Bluetooth range to cause the
application to crash or to execute arbitrary code by sending
specially crafted SDP packets.
Successful exploitation requires that Bluetooth is enabled.
2) The problem is that users are not notified about changes of mail
servers' identities when Mail is configured to use SSL for incoming
and outgoing connections. This can be exploited e.g. to impersonate
the user's mail server and obtain the user's email credentials.
Successful exploitation requires a MitM (Man-in-the-Middle) attack.
3) It is possible to cause the iPhone to call a phone number without
user confirmation by enticing a user to follow a "tel:" link in a
mail message.
4) An error in Safari in the handling of new browser windows can be
exploited to disclose the URL of an unrelated page.
For more information see vulnerability #2 in:
SA23893
5) An error in Safari in the handling of "tel:" links can be
exploited to cause the iPhone to dial a different number than the one
being displayed in the confirmation dialog. Exiting Safari during the
confirmation process may result in unintentional confirmation.
6) An error in Safari can be exploited to set Javascript window
properties of pages served from other websites when a malicious web
site is viewed.
8) An error in Safari allows a malicious website to bypass the
same-origin policy using "frame" tags. This can be exploited to
execute Javascript code in the context of another site when a user
visits a malicious web page.
9) An error in Safari allows Javascript events to be associated with
the wrong frame. This can be exploited to execute Javascript code in
context of another site when a user visits a malicious web page.
10) An error in Safari allows content served over HTTP to alter or
access content served over HTTPS in the same domain. This can be
exploited to execute Javascript code in context of HTTPS web pages in
that domain when a user visits a malicious web page.
SOLUTION:
Update to version 1.1.1 (downloadable and installable via iTunes).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Kevin Mahaffey and John Hering of Flexilis Mobile Security
3) Andi Baritchi, McAfee
4) Michal Zalewski, Google Inc. and Secunia Research
5) Billy Hoffman and Bryan Sullivan of HP Security Labs (formerly SPI
Labs) and Eduardo Tang
6, 8) Michal Zalewski, Google Inc.
10) Keigo Yamazaki of LAC Co., Ltd.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=306586
OTHER REFERENCES:
SA23893:
http://secunia.com/advisories/23893/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200709-0146 | CVE-2007-3757 | Apple iPhone of Safari Phone number displayed and phone number displayed are different |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Safari in Apple iPhone 1.1.1 allows remote user-assisted attackers to trick the iPhone user into making calls to arbitrary telephone numbers via a crafted "tel:" link that causes iPhone to display a different number than the number that will be dialed. Apple iPhone is prone to a vulnerability resulting in unauthorized phone calls.
This issue affects the phone's Safari browser.
Attackers may exploit this issue to initiate unauthorized telephone calls to arbitrary phone numbers.
NOTE: This issue was initially disclosed along with several other issues in BID 25834 (Apple iPhone 1.1.1 Update Multiple Security Vulnerabilities). Each issue has been assigned its own BID to better document the details.
Versions prior to iPhone 1.1.1 are vulnerable.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Apple iPhone Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA26983
VERIFY ADVISORY:
http://secunia.com/advisories/26983/
CRITICAL:
Moderately critical
IMPACT:
Hijacking, Security Bypass, Cross Site Scripting, Exposure of
sensitive information, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple iPhone 1.x
http://secunia.com/product/15128/
DESCRIPTION:
Some vulnerabilities, security issues, and a weakness have been
reported in the Apple iPhone, which can be exploited by malicious
people to conduct cross-site scripting attacks, disclose sensitive
information, bypass certain security restrictions, cause a DoS
(Denial of Service), or to compromise a vulnerable system.
1) An input validation error when handling SDP (Service Discovery
Protocol) packets exists in the iPhone's Bluetooth server. This can
be exploited by an attacker in Bluetooth range to cause the
application to crash or to execute arbitrary code by sending
specially crafted SDP packets.
Successful exploitation requires that Bluetooth is enabled.
2) The problem is that users are not notified about changes of mail
servers' identities when Mail is configured to use SSL for incoming
and outgoing connections. This can be exploited e.g. to impersonate
the user's mail server and obtain the user's email credentials.
Successful exploitation requires a MitM (Man-in-the-Middle) attack.
4) An error in Safari in the handling of new browser windows can be
exploited to disclose the URL of an unrelated page. Exiting Safari during the
confirmation process may result in unintentional confirmation.
6) An error in Safari can be exploited to set Javascript window
properties of pages served from other websites when a malicious web
site is viewed.
8) An error in Safari allows a malicious website to bypass the
same-origin policy using "frame" tags. This can be exploited to
execute Javascript code in the context of another site when a user
visits a malicious web page.
9) An error in Safari allows Javascript events to be associated with
the wrong frame. This can be exploited to execute Javascript code in
context of another site when a user visits a malicious web page.
10) An error in Safari allows content served over HTTP to alter or
access content served over HTTPS in the same domain. This can be
exploited to execute Javascript code in context of HTTPS web pages in
that domain when a user visits a malicious web page.
SOLUTION:
Update to version 1.1.1 (downloadable and installable via iTunes).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Kevin Mahaffey and John Hering of Flexilis Mobile Security
3) Andi Baritchi, McAfee
4) Michal Zalewski, Google Inc. and Secunia Research
5) Billy Hoffman and Bryan Sullivan of HP Security Labs (formerly SPI
Labs) and Eduardo Tang
6, 8) Michal Zalewski, Google Inc.
10) Keigo Yamazaki of LAC Co., Ltd.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=306586
OTHER REFERENCES:
SA23893:
http://secunia.com/advisories/23893/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200709-0406 | CVE-2007-4671 | Apple Mac OS X CoreText uninitialized pointer vulnerability |
CVSS V2: 6.8 CVSS V3: - Severity: MEDIUM |
Unspecified vulnerability in Safari in Apple iPhone 1.1.1, and Safari 3 before Beta Update 3.0.4 on Windows and Mac OS X 10.4 through 10.4.10, allows remote attackers to "alter or access" HTTPS content via an HTTP session with a crafted web page that causes Javascript to be applied to HTTPS pages from the same domain. Safari is a default web browser installed in Mac OS X and iPhone.
An attacker can exploit this issue to execute arbitrary script code in the context of the HTTPS webpages.
Versions prior to iPhone 1.1.1 are vulnerable.
NOTE: This issue was initially disclosed along with several other issues in BID 25834 (Apple iPhone 1.1.1 Update Multiple Security Vulnerabilities). Each issue has been assigned its own BID to better document the details. Apple iPhone is a smart phone of Apple (Apple).
----------------------------------------------------------------------
2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.
Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv
----------------------------------------------------------------------
TITLE:
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA27643
VERIFY ADVISORY:
http://secunia.com/advisories/27643/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Spoofing, Exposure of
sensitive information, Privilege escalation, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/
DESCRIPTION:
Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities.
1) Multiple errors within the Adobe Flash Player plug-in can be
exploited by malicious people to gain knowledge of sensitive
information or compromise a user's system.
For more information:
SA26027
2) A null-pointer dereference error exists within AppleRAID when
handling disk images. This can be exploited to cause a system
shutdown when a specially crafted disk image is mounted e.g.
automatically via Safari if the option "Open 'safe' files after
downloading" is enabled.
3) An error in BIND can be exploited by malicious people to poison
the DNS cache.
For more information:
SA26152
4) An error in bzip2 can be exploited to cause a DoS (Denial of
Service).
For more information:
SA15447
This also fixes a race condition when setting file permissions.
5) An unspecified error in the implementation of FTP of CFNetwork can
be exploited by a malicious FTP server to cause the client to connect
to other hosts by sending specially crafted replies to FTP PASV
(passive) commands.
6) An unspecified error exists in the validation of certificates
within CFNetwork. This can be exploited via a Man-in-the-Middle
(MitM) attack to spoof a web site with a trusted certificate.
7) A null pointer dereference error in the CFNetwork framework can
lead to an unexpected application termination when a vulnerable
application connects to a malicious server.
8) A boundary error in CoreFoundation can be exploited to cause a
one-byte buffer overflow when a user is enticed to read a specially
crafted directory hierarchy.
Successful exploitation allows execution of arbitrary code.
9) An error exists in CoreText due to the use of an uninitialised
pointer and can be exploited to execute arbitrary code when a user is
tricked into reading a specially crafted text.
10) Some vulnerabilities in Kerberos can be exploited by malicious
users and malicious people to compromise a vulnerable system.
For more information:
SA26676
11) An error in the handling of the current Mach thread port or
thread exception port in the Kernel can be exploited by a malicious,
local user to execute arbitrary code with root privileges.
Successful exploitation requires permission to execute a setuid
binary.
12) An unspecified error in the Kernel can be exploited to bypass
the chroot mechanism by changing the working directory using a
relative path.
13) An integer overflow error in the "i386_set_ldt" system call can
be exploited by malicious, local users to execute arbitrary code with
escalated privileges.
14) An error exists in the handling of standard file descriptors
while executing setuid and setgid programs. This can be exploited by
malicious, local users to gain system privileges by executing setuid
programs with the standard file descriptors in an unexpected state.
15) An integer overflow exists in the Kernel when handling ioctl
requests.
16) The default configuration of tftpd allows clients to access any
path on the system.
17) An error in the Node Information Query mechanism may allow a
remote user to query for all addresses of a host, including
link-local addresses.
18) An integer overflow exists in the handling of ASP messages with
AppleTalk. This can be exploited by malicious, local users to cause a
heap-based buffer overflow and to execute arbitrary code with system
privileges by sending a maliciously crafted ASP message on an
AppleTalk socket.
19) A double-free error in the handling of certain IPV6 packets can
potentially be exploited to execute arbitrary code with system
privileges.
20) A boundary error exists when adding a new AppleTalk zone. This
can be exploited to cause a stack-based buffer overflow by sending a
maliciously crafted ioctl request to an AppleTalk socket and allows
execution of arbitrary code with system privileges.
21) An arithmetic error exists in AppleTalk when handling memory
allocations. This can be exploited by malicious, local users to cause
a heap-based buffer overflow and execute arbitrary code with system
privileges by sending a maliciously crafted AppleTalk message.
22) A double free error in NFS exists when processing an AUTH_UNIX
RPC call. This can be exploited by malicious people to execute
arbitrary code by sending a maliciously crafted AUTH_UNIX RPC call
via TCP or UDP.
23) An unspecified case-sensitivity error exists in NSURL when
determining if a URL references the local file system.
24) A format string error in Safari can be exploited by malicious
people to execute arbitrary code when a user is tricked into opening
a .download file with a specially crafted name.
25) An implementation error exists in the tabbed browsing feature of
Safari. If HTTP authentication is used by a site being loaded in a
tab other than the active tab, an authentication sheet may be
displayed although the tab and its corresponding page are not
visible.
26) A person with physical access to a system may be able to bypass
the screen saver authentication dialog by sending keystrokes to a
process running behind the screen saver authentication dialog.
27) Safari does not block "file://" URLs when loading resources. This
can be exploited to view the content of local files by enticing a user
to visit a specially crafted web page.
28) An input validation error exists in WebCore when handling HTML
forms. This can be exploited to alter the values of form fields by
enticing a user to upload a specially crafted file.
29) A race condition error exists in Safari when handling page
transitions. This can be exploited to obtain information entered in
forms on other web sites by enticing a user to visit a malicious web
page.
30) An unspecified error exists in the handling of the browser's
history.
31) An error in Safari allows malicious websites to set Javascript
window properties of websites served from a different domain. This
can be exploited to get or set the window status and location of
pages served from other websites by enticing a user to visit a
specially crafted web page.
32) An error in Safari allows a malicious website to bypass the same
origin policy by hosting embedded objects with javascript URLs.
34) An error in Safari in the handling of new browser windows can be
exploited to disclose the URL of an unrelated page.
For more information see vulnerability #2 in:
SA23893
35) An error in WebKit may allow unauthorised applications to access
private keys added to the keychain by Safari.
36) An unspecified error in Safari may allow a malicious website to
send remotely specified data to arbitrary TCP ports.
37) WebKit/Safari creates temporary files insecurely when previewing
a PDF file, which may allow a local user to access the file's
content.
5) The vendor credits Dr Bob Lopez PhD.
6) The vendor credits Marko Karppinen, Petteri Kamppuri, and Nikita
Zhuk of MK&C.
9) Will Dormann, CERT/CC
11) An anonymous person, reported via iDefense Labs.
12) The vendor credits Johan Henselmans and Jesper Skov.
13) The vendor credits RISE Security.
14) The vendor credits Ilja van Sprundel.
15) The vendor credits Tobias Klein, www.trapkit.de
16) The vendor credits James P. Javery, Stratus Data Systems
17) The vendor credits Arnaud Ebalard, EADS Innovation Works.
18, 21) Sean Larsson, iDefense Labs
19) The vendor credits Bhavesh Davda of VMware and Brian "chort"
Keefer of Tumbleweed Communications.
20) An anonymous person, reported via iDefense Labs.
22) The vendor credits Alan Newson of NGSSoftware, and Renaud
Deraison of Tenable Network Security, Inc.
25) The vendor credits Michael Roitzsch, Technical University
Dresden.
26) The vendor credits Faisal N. Jawdat
27) The vendor credits lixlpixel.
28) The vendor credits Bodo Ruskamp, Itchigo Communications GmbH.
29) The vendor credits Ryan Grisso, NetSuite.
30) The vendor credits David Bloom.
31, 32) The vendor credits Michal Zalewski, Google Inc.
33) The vendor credits Keigo Yamazaki of LAC Co.
36) The vendor credits Kostas G. Anagnostakis, Institute for Infocomm
Research and Spiros Antonatos, FORTH-ICS
37) The vendor credits Jean-Luc Giraud, and Moritz Borgmann of ETH
Zurich.
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307041
US-CERT VU#498105:
http://www.kb.cert.org/vuls/id/498105
iDefense Labs:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=629
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=627
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=628
OTHER REFERENCES:
SA15447:
http://secunia.com/advisories/15447/
SA23893:
http://secunia.com/advisories/23893/
SA26027:
http://secunia.com/advisories/26027/
SA26152:
http://secunia.com/advisories/26152/
SA26676:
http://secunia.com/advisories/26676/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
I. Further
details are available in the related vulnerability notes.
II. Impact
The impacts of these vulnerabilities vary. Potential consequences
include remote execution of arbitrary code or commands, bypass of
security restrictions, and denial of service.
III. This and
other updates are available via Apple Update or via Apple Downloads.
IV. Please send
email to <cert@cert.org> with "TA07-319A Feedback VU#498105" in the
subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2007 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
November 15, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRzx7ZvRFkHkM87XOAQJfIQgAmTZfjJAY/QTweUmvZtOJ9JQ4e/Gj0sE9
OPSrK/SplP92WUL1Ucb8I/VUSQEXXJhNv9dTCMcy7IMpqhx4UxPA6fBKWDJ+nUFi
sx/60EOAiIVW+yYK79VdoI1jrSs48E+CNdqEJCQcjUCVi29eGAdW63H2jOZV37/F
4iQBZYRqhiycZ9FS+S+9aRfMhfy8dEOr1UwIElq6X/tSwss1EKFSNrK5ktGifUtB
AJ+LJVBt2yZOIApcGhsxC3LYUDrDfhqGLIVM2XBc1yuV7Y2gaH4g9Txe+fWK79X2
LYHvhv2xtgLweR12YC+0hT60wSdrDTM6ZW0//ny25LZ7Y7D46ogSWQ==
=AgEr
-----END PGP SIGNATURE-----
.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
2) The problem is that users are not notified about changes of mail
servers' identities when Mail is configured to use SSL for incoming
and outgoing connections. This can be exploited e.g. to impersonate
the user's mail server and obtain the user's email credentials.
3) It is possible to cause the iPhone to call a phone number without
user confirmation by enticing a user to follow a "tel:" link in a
mail message. Exiting Safari during the
confirmation process may result in unintentional confirmation.
7) Disabling Javascript in Safari does not take effect until Safari
is restarted.
SOLUTION:
Update to version 1.1.1 (downloadable and installable via iTunes).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Kevin Mahaffey and John Hering of Flexilis Mobile Security
3) Andi Baritchi, McAfee
4) Michal Zalewski, Google Inc. and Secunia Research
5) Billy Hoffman and Bryan Sullivan of HP Security Labs (formerly SPI
Labs) and Eduardo Tang
6, 8) Michal Zalewski, Google Inc
VAR-200709-0144 | CVE-2007-3755 | Apple iPhone of Mail Confirmation screen for linked phone numbers is not displayed |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Mail in Apple iPhone 1.1.1 allows remote user-assisted attackers to force the iPhone user to make calls to arbitrary telephone numbers via a "tel:" link, which does not prompt the user before dialing the number.
This issue affects the phone's Mail application.
NOTE: This issue was initially disclosed along with several other issues in BID 25834 (Apple iPhone 1.1.1 Update Multiple Security Vulnerabilities). Each issue has been assigned its own BID to better document the details.
Versions prior to iPhone 1.1.1 are vulnerable. Apple iPhone is a smart phone of Apple (Apple).
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Apple iPhone Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA26983
VERIFY ADVISORY:
http://secunia.com/advisories/26983/
CRITICAL:
Moderately critical
IMPACT:
Hijacking, Security Bypass, Cross Site Scripting, Exposure of
sensitive information, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple iPhone 1.x
http://secunia.com/product/15128/
DESCRIPTION:
Some vulnerabilities, security issues, and a weakness have been
reported in the Apple iPhone, which can be exploited by malicious
people to conduct cross-site scripting attacks, disclose sensitive
information, bypass certain security restrictions, cause a DoS
(Denial of Service), or to compromise a vulnerable system.
1) An input validation error when handling SDP (Service Discovery
Protocol) packets exists in the iPhone's Bluetooth server. This can
be exploited by an attacker in Bluetooth range to cause the
application to crash or to execute arbitrary code by sending
specially crafted SDP packets.
Successful exploitation requires that Bluetooth is enabled.
2) The problem is that users are not notified about changes of mail
servers' identities when Mail is configured to use SSL for incoming
and outgoing connections. This can be exploited e.g. to impersonate
the user's mail server and obtain the user's email credentials.
Successful exploitation requires a MitM (Man-in-the-Middle) attack.
4) An error in Safari in the handling of new browser windows can be
exploited to disclose the URL of an unrelated page.
For more information see vulnerability #2 in:
SA23893
5) An error in Safari in the handling of "tel:" links can be
exploited to cause the iPhone to dial a different number than the one
being displayed in the confirmation dialog. Exiting Safari during the
confirmation process may result in unintentional confirmation.
6) An error in Safari can be exploited to set Javascript window
properties of pages served from other websites when a malicious web
site is viewed.
7) Disabling Javascript in Safari does not take effect until Safari
is restarted.
8) An error in Safari allows a malicious website to bypass the
same-origin policy using "frame" tags. This can be exploited to
execute Javascript code in the context of another site when a user
visits a malicious web page.
9) An error in Safari allows Javascript events to be associated with
the wrong frame. This can be exploited to execute Javascript code in
context of another site when a user visits a malicious web page.
10) An error in Safari allows content served over HTTP to alter or
access content served over HTTPS in the same domain. This can be
exploited to execute Javascript code in context of HTTPS web pages in
that domain when a user visits a malicious web page.
SOLUTION:
Update to version 1.1.1 (downloadable and installable via iTunes).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Kevin Mahaffey and John Hering of Flexilis Mobile Security
3) Andi Baritchi, McAfee
4) Michal Zalewski, Google Inc. and Secunia Research
5) Billy Hoffman and Bryan Sullivan of HP Security Labs (formerly SPI
Labs) and Eduardo Tang
6, 8) Michal Zalewski, Google Inc.
10) Keigo Yamazaki of LAC Co., Ltd.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=306586
OTHER REFERENCES:
SA23893:
http://secunia.com/advisories/23893/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200709-0142 | CVE-2007-3753 | Apple iPhone of Bluetooth Illegal in SDP Vulnerability in arbitrary code execution due to packet processing |
CVSS V2: 7.5 CVSS V3: - Severity: HIGH |
Apple iPhone 1.1.1, with Bluetooth enabled, allows physically proximate attackers to cause a denial of service (application termination) and execute arbitrary code via crafted Service Discovery Protocol (SDP) packets, related to insufficient input validation. Apple iPhone is prone to a vulnerability that lets attackers excecute arbitrary code.
This issue affects the phone's Bluetooth implementation.
An attacker in Bluetooth range of the phone may be able to execute arbitrary code. Failed exploit attempts will cause denial-of-service conditions.
Versions prior to iPhone 1.1.1 are vulnerable.
NOTE: This issue was initially disclosed along with several other issues in BID 25834 (Apple iPhone 1.1.1 Update Multiple Security Vulnerabilities). Each issue has been assigned its own BID to better document the details. Apple iPhone is a smart phone of Apple (Apple).
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Apple iPhone Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA26983
VERIFY ADVISORY:
http://secunia.com/advisories/26983/
CRITICAL:
Moderately critical
IMPACT:
Hijacking, Security Bypass, Cross Site Scripting, Exposure of
sensitive information, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple iPhone 1.x
http://secunia.com/product/15128/
DESCRIPTION:
Some vulnerabilities, security issues, and a weakness have been
reported in the Apple iPhone, which can be exploited by malicious
people to conduct cross-site scripting attacks, disclose sensitive
information, bypass certain security restrictions, cause a DoS
(Denial of Service), or to compromise a vulnerable system.
Successful exploitation requires that Bluetooth is enabled.
2) The problem is that users are not notified about changes of mail
servers' identities when Mail is configured to use SSL for incoming
and outgoing connections. This can be exploited e.g. to impersonate
the user's mail server and obtain the user's email credentials.
Successful exploitation requires a MitM (Man-in-the-Middle) attack.
3) It is possible to cause the iPhone to call a phone number without
user confirmation by enticing a user to follow a "tel:" link in a
mail message.
4) An error in Safari in the handling of new browser windows can be
exploited to disclose the URL of an unrelated page.
For more information see vulnerability #2 in:
SA23893
5) An error in Safari in the handling of "tel:" links can be
exploited to cause the iPhone to dial a different number than the one
being displayed in the confirmation dialog. Exiting Safari during the
confirmation process may result in unintentional confirmation.
6) An error in Safari can be exploited to set Javascript window
properties of pages served from other websites when a malicious web
site is viewed.
7) Disabling Javascript in Safari does not take effect until Safari
is restarted.
8) An error in Safari allows a malicious website to bypass the
same-origin policy using "frame" tags. This can be exploited to
execute Javascript code in the context of another site when a user
visits a malicious web page.
9) An error in Safari allows Javascript events to be associated with
the wrong frame. This can be exploited to execute Javascript code in
context of another site when a user visits a malicious web page.
10) An error in Safari allows content served over HTTP to alter or
access content served over HTTPS in the same domain. This can be
exploited to execute Javascript code in context of HTTPS web pages in
that domain when a user visits a malicious web page.
SOLUTION:
Update to version 1.1.1 (downloadable and installable via iTunes).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Kevin Mahaffey and John Hering of Flexilis Mobile Security
3) Andi Baritchi, McAfee
4) Michal Zalewski, Google Inc. and Secunia Research
5) Billy Hoffman and Bryan Sullivan of HP Security Labs (formerly SPI
Labs) and Eduardo Tang
6, 8) Michal Zalewski, Google Inc.
10) Keigo Yamazaki of LAC Co., Ltd.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=306586
OTHER REFERENCES:
SA23893:
http://secunia.com/advisories/23893/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200709-0143 | CVE-2007-3754 | Apple iPhone of Mail Vulnerable to man-in-the-middle attacks |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Mail in Apple iPhone 1.1.1, when using SSL, does not warn the user when the mail server changes or is not trusted, which might allow remote attackers to steal credentials and read email via a man-in-the-middle (MITM) attack. By using this issue, there is a possibility of a man-in-the-middle attack leaking certificate and email information.A third party may be subjected to a man-in-the-middle attack, which may leak certificate and email information. Apple iPhone Mail is prone to an information-disclosure vulnerability.
Attackers may exploit this issue to access potentially sensitive information; this may aid in further attacks.
Versions prior to iPhone 1.1.1 are vulnerable.
NOTE: This issue was initially disclosed along with several other issues in BID 25834 (Apple iPhone 1.1.1 Update Multiple Security Vulnerabilities). Each issue has been assigned its own BID to better document the details.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
Request your account, the Secunia Network Software Inspector (NSI):
http://secunia.com/network_software_inspector/
----------------------------------------------------------------------
TITLE:
Apple iPhone Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA26983
VERIFY ADVISORY:
http://secunia.com/advisories/26983/
CRITICAL:
Moderately critical
IMPACT:
Hijacking, Security Bypass, Cross Site Scripting, Exposure of
sensitive information, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple iPhone 1.x
http://secunia.com/product/15128/
DESCRIPTION:
Some vulnerabilities, security issues, and a weakness have been
reported in the Apple iPhone, which can be exploited by malicious
people to conduct cross-site scripting attacks, disclose sensitive
information, bypass certain security restrictions, cause a DoS
(Denial of Service), or to compromise a vulnerable system.
1) An input validation error when handling SDP (Service Discovery
Protocol) packets exists in the iPhone's Bluetooth server. This can
be exploited by an attacker in Bluetooth range to cause the
application to crash or to execute arbitrary code by sending
specially crafted SDP packets.
Successful exploitation requires that Bluetooth is enabled. This can be exploited e.g. to impersonate
the user's mail server and obtain the user's email credentials.
Successful exploitation requires a MitM (Man-in-the-Middle) attack.
3) It is possible to cause the iPhone to call a phone number without
user confirmation by enticing a user to follow a "tel:" link in a
mail message.
4) An error in Safari in the handling of new browser windows can be
exploited to disclose the URL of an unrelated page.
For more information see vulnerability #2 in:
SA23893
5) An error in Safari in the handling of "tel:" links can be
exploited to cause the iPhone to dial a different number than the one
being displayed in the confirmation dialog. Exiting Safari during the
confirmation process may result in unintentional confirmation.
6) An error in Safari can be exploited to set Javascript window
properties of pages served from other websites when a malicious web
site is viewed.
7) Disabling Javascript in Safari does not take effect until Safari
is restarted.
8) An error in Safari allows a malicious website to bypass the
same-origin policy using "frame" tags. This can be exploited to
execute Javascript code in the context of another site when a user
visits a malicious web page.
9) An error in Safari allows Javascript events to be associated with
the wrong frame. This can be exploited to execute Javascript code in
context of another site when a user visits a malicious web page.
10) An error in Safari allows content served over HTTP to alter or
access content served over HTTPS in the same domain. This can be
exploited to execute Javascript code in context of HTTPS web pages in
that domain when a user visits a malicious web page.
SOLUTION:
Update to version 1.1.1 (downloadable and installable via iTunes).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Kevin Mahaffey and John Hering of Flexilis Mobile Security
3) Andi Baritchi, McAfee
4) Michal Zalewski, Google Inc. and Secunia Research
5) Billy Hoffman and Bryan Sullivan of HP Security Labs (formerly SPI
Labs) and Eduardo Tang
6, 8) Michal Zalewski, Google Inc.
10) Keigo Yamazaki of LAC Co., Ltd.
ORIGINAL ADVISORY:
http://docs.info.apple.com/article.html?artnum=306586
OTHER REFERENCES:
SA23893:
http://secunia.com/advisories/23893/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
VAR-200709-0149 | CVE-2007-3760 | Apple Mac OS X CoreText uninitialized pointer vulnerability |
CVSS V2: 4.3 CVSS V3: - Severity: MEDIUM |
Cross-site scripting (XSS) vulnerability in Safari in Apple iPhone 1.1.1, and Safari 3 before Beta Update 3.0.4 on Windows and Mac OS X 10.4 through 10.4.10, allows remote attackers to inject arbitrary web script or HTML via frame tags. Apple iPhone Mobile Safari Browser is prone to a vulnerability that lets attackers bypass the same-origin policy.
Attackers can exploit this issue to execute arbitrary JavaScript in the context of another domain.
Versions prior to iPhone 1.1.1 are vulnerable.
NOTE: This issue was initially disclosed along with several other issues in BID 25834 (Apple iPhone 1.1.1 Update Multiple Security Vulnerabilities). Each issue has been assigned its own BID to better document the details. Apple iPhone is a smart phone of Apple (Apple).
----------------------------------------------------------------------
2003: 2,700 advisories published
2004: 3,100 advisories published
2005: 4,600 advisories published
2006: 5,300 advisories published
How do you know which Secunia advisories are important to you?
The Secunia Vulnerability Intelligence Solutions allows you to filter
and structure all the information you need, so you can address issues
effectively.
Get a free trial of the Secunia Vulnerability Intelligence Solutions:
http://corporate.secunia.com/how_to_buy/38/vi/?ref=secadv
----------------------------------------------------------------------
TITLE:
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities
SECUNIA ADVISORY ID:
SA27643
VERIFY ADVISORY:
http://secunia.com/advisories/27643/
CRITICAL:
Highly critical
IMPACT:
Security Bypass, Cross Site Scripting, Spoofing, Exposure of
sensitive information, Privilege escalation, DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Apple Macintosh OS X
http://secunia.com/product/96/
DESCRIPTION:
Apple has issued a security update for Mac OS X, which fixes multiple
vulnerabilities.
1) Multiple errors within the Adobe Flash Player plug-in can be
exploited by malicious people to gain knowledge of sensitive
information or compromise a user's system.
For more information:
SA26027
2) A null-pointer dereference error exists within AppleRAID when
handling disk images. This can be exploited to cause a system
shutdown when a specially crafted disk image is mounted e.g.
automatically via Safari if the option "Open 'safe' files after
downloading" is enabled.
3) An error in BIND can be exploited by malicious people to poison
the DNS cache.
For more information:
SA26152
4) An error in bzip2 can be exploited to cause a DoS (Denial of
Service).
For more information:
SA15447
This also fixes a race condition when setting file permissions.
5) An unspecified error in the implementation of FTP of CFNetwork can
be exploited by a malicious FTP server to cause the client to connect
to other hosts by sending specially crafted replies to FTP PASV
(passive) commands.
6) An unspecified error exists in the validation of certificates
within CFNetwork. This can be exploited via a Man-in-the-Middle
(MitM) attack to spoof a web site with a trusted certificate.
7) A null pointer dereference error in the CFNetwork framework can
lead to an unexpected application termination when a vulnerable
application connects to a malicious server.
8) A boundary error in CoreFoundation can be exploited to cause a
one-byte buffer overflow when a user is enticed to read a specially
crafted directory hierarchy.
Successful exploitation allows execution of arbitrary code.
9) An error exists in CoreText due to the use of an uninitialised
pointer and can be exploited to execute arbitrary code when a user is
tricked into reading a specially crafted text.
10) Some vulnerabilities in Kerberos can be exploited by malicious
users and malicious people to compromise a vulnerable system.
For more information:
SA26676
11) An error in the handling of the current Mach thread port or
thread exception port in the Kernel can be exploited by a malicious,
local user to execute arbitrary code with root privileges.
Successful exploitation requires permission to execute a setuid
binary.
12) An unspecified error in the Kernel can be exploited to bypass
the chroot mechanism by changing the working directory using a
relative path.
13) An integer overflow error in the "i386_set_ldt" system call can
be exploited by malicious, local users to execute arbitrary code with
escalated privileges.
14) An error exists in the handling of standard file descriptors
while executing setuid and setgid programs. This can be exploited by
malicious, local users to gain system privileges by executing setuid
programs with the standard file descriptors in an unexpected state.
15) An integer overflow exists in the Kernel when handling ioctl
requests. This can be exploited to execute arbitrary code with system
privileges by sending a specially crafted ioctl request.
16) The default configuration of tftpd allows clients to access any
path on the system.
17) An error in the Node Information Query mechanism may allow a
remote user to query for all addresses of a host, including
link-local addresses.
18) An integer overflow exists in the handling of ASP messages with
AppleTalk. This can be exploited by malicious, local users to cause a
heap-based buffer overflow and to execute arbitrary code with system
privileges by sending a maliciously crafted ASP message on an
AppleTalk socket.
19) A double-free error in the handling of certain IPV6 packets can
potentially be exploited to execute arbitrary code with system
privileges.
20) A boundary error exists when adding a new AppleTalk zone. This
can be exploited to cause a stack-based buffer overflow by sending a
maliciously crafted ioctl request to an AppleTalk socket and allows
execution of arbitrary code with system privileges.
21) An arithmetic error exists in AppleTalk when handling memory
allocations. This can be exploited by malicious, local users to cause
a heap-based buffer overflow and execute arbitrary code with system
privileges by sending a maliciously crafted AppleTalk message.
22) A double free error in NFS exists when processing an AUTH_UNIX
RPC call. This can be exploited by malicious people to execute
arbitrary code by sending a maliciously crafted AUTH_UNIX RPC call
via TCP or UDP.
23) An unspecified case-sensitivity error exists in NSURL when
determining if a URL references the local file system.
24) A format string error in Safari can be exploited by malicious
people to execute arbitrary code when a user is tricked into opening
a .download file with a specially crafted name.
25) An implementation error exists in the tabbed browsing feature of
Safari. If HTTP authentication is used by a site being loaded in a
tab other than the active tab, an authentication sheet may be
displayed although the tab and its corresponding page are not
visible.
26) A person with physical access to a system may be able to bypass
the screen saver authentication dialog by sending keystrokes to a
process running behind the screen saver authentication dialog.
27) Safari does not block "file://" URLs when loading resources. This
can be exploited to view the content of local files by enticing a user
to visit a specially crafted web page.
28) An input validation error exists in WebCore when handling HTML
forms. This can be exploited to alter the values of form fields by
enticing a user to upload a specially crafted file.
29) A race condition error exists in Safari when handling page
transitions. This can be exploited to obtain information entered in
forms on other web sites by enticing a user to visit a malicious web
page.
30) An unspecified error exists in the handling of the browser's
history. This can be exploited to execute arbitrary code by enticing
a user to visit a specially crafted web page.
31) An error in Safari allows malicious websites to set Javascript
window properties of websites served from a different domain. This
can be exploited to get or set the window status and location of
pages served from other websites by enticing a user to visit a
specially crafted web page.
32) An error in Safari allows a malicious website to bypass the same
origin policy by hosting embedded objects with javascript URLs. This
can be exploited to execute arbitrary HTML and script code in context
of another site by enticing a user to visit a specially crafted web
page.
33) An error in Safari allows content served over HTTP to alter or
access content served over HTTPS in the same domain.
34) An error in Safari in the handling of new browser windows can be
exploited to disclose the URL of an unrelated page.
For more information see vulnerability #2 in:
SA23893
35) An error in WebKit may allow unauthorised applications to access
private keys added to the keychain by Safari.
36) An unspecified error in Safari may allow a malicious website to
send remotely specified data to arbitrary TCP ports.
37) WebKit/Safari creates temporary files insecurely when previewing
a PDF file, which may allow a local user to access the file's
content.
SOLUTION:
Update to Mac OS X 10.4.11 or apply Security Update 2007-008.
Security Update 2007-008 (10.3.9 Client):
http://www.apple.com/support/downloads/securityupdate20070081039client.html
Security Update 2007-008 (10.3.9 Server):
http://www.apple.com/support/downloads/securityupdate20070081039server.html
Mac OS X 10.4.11 Combo Update (PPC):
http://www.apple.com/support/downloads/macosx10411comboupdateppc.html
Mac OS X 10.4.11 Update (Intel):
http://www.apple.com/support/downloads/macosx10411updateintel.html
Mac OS X 10.4.11 Combo Update (Intel):
http://www.apple.com/support/downloads/macosx10411comboupdateintel.html
Mac OS X 10.4.11 Update (PPC):
http://www.apple.com/support/downloads/macosx10411updateppc.html
Mac OS X Server 10.4.11 Update (Universal):
http://www.apple.com/support/downloads/macosx10411updateppc.html
Mac OS X Server 10.4.11 Combo Update (Universal):
http://www.apple.com/support/downloads/macosxserver10411comboupdateuniversal.html
Mac OS X Server 10.4.11 Update (PPC):
http://www.apple.com/support/downloads/macosxserver10411updateppc.html
Mac OS X Server 10.4.11 Combo Update (PPC):
http://www.apple.com/support/downloads/macosxserver10411comboupdateppc.html
PROVIDED AND/OR DISCOVERED BY:
2) The vendor credits Mark Tull, University of Hertfordshire and Joel
Vink, Zetera Corporation.
5) The vendor credits Dr Bob Lopez PhD.
6) The vendor credits Marko Karppinen, Petteri Kamppuri, and Nikita
Zhuk of MK&C.
9) Will Dormann, CERT/CC
11) An anonymous person, reported via iDefense Labs.
12) The vendor credits Johan Henselmans and Jesper Skov.
13) The vendor credits RISE Security.
14) The vendor credits Ilja van Sprundel.
15) The vendor credits Tobias Klein, www.trapkit.de
16) The vendor credits James P. Javery, Stratus Data Systems
17) The vendor credits Arnaud Ebalard, EADS Innovation Works.
18, 21) Sean Larsson, iDefense Labs
19) The vendor credits Bhavesh Davda of VMware and Brian "chort"
Keefer of Tumbleweed Communications.
20) An anonymous person, reported via iDefense Labs.
22) The vendor credits Alan Newson of NGSSoftware, and Renaud
Deraison of Tenable Network Security, Inc.
25) The vendor credits Michael Roitzsch, Technical University
Dresden.
26) The vendor credits Faisal N. Jawdat
27) The vendor credits lixlpixel.
28) The vendor credits Bodo Ruskamp, Itchigo Communications GmbH.
29) The vendor credits Ryan Grisso, NetSuite.
30) The vendor credits David Bloom.
31, 32) The vendor credits Michal Zalewski, Google Inc.
33) The vendor credits Keigo Yamazaki of LAC Co.
36) The vendor credits Kostas G. Anagnostakis, Institute for Infocomm
Research and Spiros Antonatos, FORTH-ICS
37) The vendor credits Jean-Luc Giraud, and Moritz Borgmann of ETH
Zurich.
ORIGINAL ADVISORY:
Apple:
http://docs.info.apple.com/article.html?artnum=307041
US-CERT VU#498105:
http://www.kb.cert.org/vuls/id/498105
iDefense Labs:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=630
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=629
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=627
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=628
OTHER REFERENCES:
SA15447:
http://secunia.com/advisories/15447/
SA23893:
http://secunia.com/advisories/23893/
SA26027:
http://secunia.com/advisories/26027/
SA26152:
http://secunia.com/advisories/26152/
SA26676:
http://secunia.com/advisories/26676/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------
Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
----------------------------------------------------------------------
.
I. Further
details are available in the related vulnerability notes.
II. Impact
The impacts of these vulnerabilities vary. Potential consequences
include remote execution of arbitrary code or commands, bypass of
security restrictions, and denial of service.
III. This and
other updates are available via Apple Update or via Apple Downloads.
IV. Please send
email to <cert@cert.org> with "TA07-319A Feedback VU#498105" in the
subject.
____________________________________________________________________
For instructions on subscribing to or unsubscribing from this
mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________
Produced 2007 by US-CERT, a government organization.
Terms of use:
<http://www.us-cert.gov/legal.html>
____________________________________________________________________
Revision History
November 15, 2007: Initial release
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iQEVAwUBRzx7ZvRFkHkM87XOAQJfIQgAmTZfjJAY/QTweUmvZtOJ9JQ4e/Gj0sE9
OPSrK/SplP92WUL1Ucb8I/VUSQEXXJhNv9dTCMcy7IMpqhx4UxPA6fBKWDJ+nUFi
sx/60EOAiIVW+yYK79VdoI1jrSs48E+CNdqEJCQcjUCVi29eGAdW63H2jOZV37/F
4iQBZYRqhiycZ9FS+S+9aRfMhfy8dEOr1UwIElq6X/tSwss1EKFSNrK5ktGifUtB
AJ+LJVBt2yZOIApcGhsxC3LYUDrDfhqGLIVM2XBc1yuV7Y2gaH4g9Txe+fWK79X2
LYHvhv2xtgLweR12YC+0hT60wSdrDTM6ZW0//ny25LZ7Y7D46ogSWQ==
=AgEr
-----END PGP SIGNATURE-----
.
----------------------------------------------------------------------
Try a new way to discover vulnerabilities that ALREADY EXIST in your
IT infrastructure.
The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT
vulnerabilities in more than 4,700 different Windows applications.
2) The problem is that users are not notified about changes of mail
servers' identities when Mail is configured to use SSL for incoming
and outgoing connections. This can be exploited e.g. to impersonate
the user's mail server and obtain the user's email credentials.
3) It is possible to cause the iPhone to call a phone number without
user confirmation by enticing a user to follow a "tel:" link in a
mail message. Exiting Safari during the
confirmation process may result in unintentional confirmation.
7) Disabling Javascript in Safari does not take effect until Safari
is restarted.
SOLUTION:
Update to version 1.1.1 (downloadable and installable via iTunes).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1) Kevin Mahaffey and John Hering of Flexilis Mobile Security
3) Andi Baritchi, McAfee
4) Michal Zalewski, Google Inc. and Secunia Research
5) Billy Hoffman and Bryan Sullivan of HP Security Labs (formerly SPI
Labs) and Eduardo Tang
6, 8) Michal Zalewski, Google Inc