Computer Security
[EN] securityvulns.ru no-pyccku


Apple iOS 6.0 multiple security vulnerabilities
Published:05.11.2012
Source:
SecurityVulns ID:12694
Type:client
Threat Level:
6/10
Description:Information leakage, protection bypass, memory corruption, race conditions.
Affected:APPLE : iPhone 3GS
 APPLE : iPhone 4
 APPLE : iPhone 4s
 APPLE : iPhone 5
CVE:CVE-2012-5112 (Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.)
 CVE-2012-3750 (The Passcode Lock implementation in Apple iOS before 6.0.1 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement and access Passbook passes via unspecified vectors.)
 CVE-2012-3749 (The extensions APIs in the kernel in Apple iOS before 6.0.1 provide kernel addresses in responses that contain an OSBundleMachOHeaders key, which makes it easier for remote attackers to bypass the ASLR protection mechanism via a crafted app.)
 CVE-2012-3748 (Race condition in WebKit in Apple iOS before 6.0.1 and Safari before 6.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving JavaScript arrays.)
Original documentdocumentAPPLE, APPLE-SA-2012-11-01-1 iOS 6.0.1 (05.11.2012)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod