Skip to main content

Apple iOS Multiple Vulnerabilities

Last Update Date: 9 Mar 2012 11:28 Release Date: 9 Mar 2012 5067 Views

RISK: High Risk

TYPE: Operating Systems - Mobile & Apps

TYPE: Mobile & Apps

Multiple vulnerabilities have identified in Apple iOS. A remote user can conduct cross-site scripting attacks, obtain potentially sensitive information and cause arbitrary code to be executed on the target user's system. A local user can bypass the screen lock.

  1. A remote user can create a specially crafted URL that, when loaded by the target user, will cause CFNetwork to send unexpected request headers and disclose potentially sensitive information.
  2. A user can create a specially crafted HFS disk image that, when loaded by the target user, will trigger an integer underflow and cause the system to shutdown or execute arbitrary code.
  3. A user can run a specially crafted program to exploit a bug in the handling of debug system calls and bypass sandbox restrictions.
  4. A physically local user can bypass the screen lock passcode function.
  5. A remote user can cause web page visits to be recorded in the browser history when Private Browsing is active by exploiting the JavaScript methods pushState and replaceState.
  6. A physically local user can use Siri to access a front-most email message selected behind a lock screen.
  7. A remote user can create a specially crafted Racoon configuration file to trigger a format string flaw and execute arbitrary code with system privileges.
  8. A remote user can cause arbitrary scripting code to be executed by the target user's browser.The code will run in the security context of an arbitrary site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
  9. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error in WebKit and execute arbitrary code on the target system. The code will run with the privileges of the target user.