Computer Security
[EN] securityvulns.ru no-pyccku


Apple iOS multiple security vulnerabilities
Published:24.03.2013
Source:
SecurityVulns ID:12962
Type:library
Threat Level:
6/10
Description:Protection bypass, privilege escalation, code execution.
Affected:APPLE : Appple iOS 6.1
CVE:CVE-2013-0981 (The IOUSBDeviceFamily driver in the USB implementation in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 accesses pipe object pointers that originated in userspace, which allows local users to gain privileges via crafted code.)
 CVE-2013-0980 (The Passcode Lock implementation in Apple iOS before 6.1.3 does not properly manage the lock state, which allows physically proximate attackers to bypass an intended passcode requirement by leveraging an error in the emergency-call feature.)
 CVE-2013-0979 (lockdownd in Lockdown in Apple iOS before 6.1.3 does not properly consider file types during the permission-setting step of a backup restoration, which allows local users to change the permissions of arbitrary files via a backup that contains a pathname with a symlink.)
 CVE-2013-0978 (The ARM prefetch abort handler in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not ensure that it has been invoked in an abort context, which makes it easier for local users to bypass the ASLR protection mechanism via crafted code.)
 CVE-2013-0977 (dyld in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not properly manage the state of file loading for Mach-O executable files, which allows local users to bypass intended code-signing requirements via a file that contains overlapping segments.)
 CVE-2013-0912 (WebKit in Google Chrome before 25.0.1364.160 allows remote attackers to execute arbitrary code via vectors that leverage "type confusion.")
Original documentdocumentAPPLE, APPLE-SA-2013-03-19-1 iOS 6.1.3 (24.03.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod