Apple iPhone Multiple Vulnerabilities
RISK: Medium Risk
Multiple vulnerabilities have been identified in Apple iPhone, which could be exploited by attackers to bypass security restrictions, poison DNS cache, cause a denial of service or compromise a vulnerable system.
1. An error in the Application Sandbox that does not properly enforce access restrictions between third-party applications, which may allow a third-party application to read files in another third-party application's sandbox and lead to the disclosure of sensitive information.
2. Errors in FreeType could be exploited to execute arbitrary code.
3. An error in mDNSResponder, which may allow DNS cache poisoning attacks.
4. Due to predictable TCP initial sequence numbers being generated, which could allow a remote attacker to create a spoofed TCP connection or insert data into an existing TCP connection.
5. An implementation error in the Passcode Lock feature when handling emergency calls, which could allow users with physical access to an iPhone to launch an application without the passcode by double clicking the home button in emergency call.
6. A use-after-free error in WebKit when handling CSS import statements, which could allow malicious websites to crash an affected application or execute arbitrary code.
Impact
- Denial of Service
- Remote Code Execution
- Security Restriction Bypass
System / Technologies affected
- Apple iPhone versions 1.0 through 2.0.2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
Upgrade to Apple iPhone version 2.1.
http://www.apple.com/iphone/softwareupdate/
Vulnerability Identifier
Source
Related Link
Share with