Информационная безопасность
[RU] switch to English


Многочисленные уязвимости безопасности в Apple iOS
Опубликовано:24 марта 2013 г.
Источник:
SecurityVulns ID:12962
Тип:библиотека
Уровень опасности:
6/10
Описание:Обход механизмов защиты, повышение привилегий, выполнение кода,
Затронутые продукты:APPLE : Appple iOS 6.1
CVE:CVE-2013-0981 (The IOUSBDeviceFamily driver in the USB implementation in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 accesses pipe object pointers that originated in userspace, which allows local users to gain privileges via crafted code.)
 CVE-2013-0980 (The Passcode Lock implementation in Apple iOS before 6.1.3 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement by leveraging an error in the emergency-call feature.)
 CVE-2013-0979 (lockdownd in Lockdown in Apple iOS before 6.1.3 does not properly consider file types during the permission-setting step of a backup restoration, which allows local users to change the permissions of arbitrary files via a backup that contains a pathname with a symlink.)
 CVE-2013-0978 (The ARM prefetch abort handler in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not ensure that it has been invoked in an abort context, which makes it easier for local users to bypass the ASLR protection mechanism via crafted code.)
 CVE-2013-0977 (dyld in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not properly manage the state of file loading for Mach-O executable files, which allows local users to bypass intended code-signing requirements via a file that contains overlapping segments.)
 CVE-2013-0912 (WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion.")
Оригинальный текстdocumentAPPLE, APPLE-SA-2013-03-19-1 iOS 6.1.3 (24.03.2013)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород