Skip to main content

Apple iPhone and iPod touch Multiple Code Execution Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 19 Jun 2009 4504 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Apple iPhone and iPod touch, which could be exploited by atatckers to bypass security restrictions, gain knowledge of sensitive information, cause a denial of service or compromise a vulnerable system. These issues are caused by buffer overflows, memory corruptions and use-after-free, integer overflows and underflows, uninitialized pointers, implementation and design issues, memory leaks, and input validation errors in CoreGraphics, Exchange, ImageIO, ICU, IPSec, libxml, Mail, MPEG-4 Video Codec, Profiles, Safari, Telephony, and WebKit.