Skip to main content

Apple iPhone Multiple Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 16 Sep 2008 5765 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Apple iPhone, which could be exploited by attackers to bypass security restrictions, poison DNS cache, cause a denial of service or compromise a vulnerable system.

1. An error in the Application Sandbox that does not properly enforce access restrictions between third-party applications, which may allow a third-party application to read files in another third-party application's sandbox and lead to the disclosure of sensitive information.

2. Errors in FreeType could be exploited to execute arbitrary code.

3. An error in mDNSResponder, which may allow DNS cache poisoning attacks.

4. Due to predictable TCP initial sequence numbers being generated, which could allow a remote attacker to create a spoofed TCP connection or insert data into an existing TCP connection.

5. An implementation error in the Passcode Lock feature when handling emergency calls, which could allow users with physical access to an iPhone to launch an application without the passcode by double clicking the home button in emergency call.

6. A use-after-free error in WebKit when handling CSS import statements, which could allow malicious websites to crash an affected application or execute arbitrary code.


Impact

  • Denial of Service
  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • Apple iPhone versions 1.0 through 2.0.2

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

Upgrade to Apple iPhone version 2.1.
http://www.apple.com/iphone/softwareupdate/


Vulnerability Identifier


Source


Related Link