Some vulnerabilities have been reported in Apple iPhone, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, and potentially to compromise a vulnerable system.
Successful exploitation may allow execution of arbitrary code.
3) An HTTP injection issue in XMLHttpRequest can be exploited to inject arbitrary HTTP requests.
For more information see vulnerability #2 in: SA25786
4) An error in WebKit within in the handling of International Domain Name (IDN) support and Unicode fonts embedded in Safari can be exploited to spoof a URL by registering domain names with certain international characters that resembles other commonly used characters.
5) An invalid type conversion when rendering frame sets may allow execution of arbitrary code.
For more information see vulnerability #1 in: SA25786
Solution: Update to version 1.0.1 (downloadable and installable via iTunes).
Provided and/or discovered by: 1) The vendor credits Lawrence Lai, Stan Switzer, and Ed Rowe of Adobe Systems, Inc.
2) The vendor credits Charlie Miller and Jake Honoroff of Independent Security Evaluators.
3) The vendor credits Richard Moore, Westpoint Ltd.
5) The vendor credits Rhys Kidd, Westnet.
Original Advisory: http://docs.info.apple.com/article.html?artnum=306173
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com
Subject: Apple iPhone Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.