Some vulnerabilities have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), disclose sensitive information, conduct cross-site scripting and cross-site request forgery attacks, or compromise a user's system.
1) Multiple vulnerabilities in CoreGraphics can be exploited by malicious people to compromise a user's system.
17) An error in WebKit in the handling of HTMLSelectElement objects can be exploited to cause a device reset.
18) An error in WebKit can be exploited to load and capture an image from another website by using a canvas and a redirect.
19) An error in WebKit allows frames to be accessed by an HTML document after a page transition, which can be exploited to conduct cross-site scripting attacks.
20) An error in the handling of XMLHttpRequest headers in WebKit can be exploited to bypass the same-origin policy.
22) An error in WebKit within the handling of Location and History objects can be exploited to conduct cross-site scripting attacks.
Solution: Update to iPhone OS 3.0 or iPhone OS for iPod touch 3.0 (downloadable and installable via iTunes).
Provided and/or discovered by: 7) Collin Mulliner of Fraunhofer SIT
10) Masaki Yoshida
The vendor credits:
1) * Alin Rad Pop, Secunia Research
* Will Dormann, CERT/CC
* Barry K. Nathan
* Tavis Ormandy, Google Security Team
2) FD of Securus Global
3) Tavis Ormandy, Google Security Team
4) Chris Weber, Casaba Security
8) Si Brindley
9) Joshua Belsky
11) * Thomas Raffetseder International Secure Systems Lab
* Nils working with the ZDI
* Michal Zalewski, Google Inc
* SkyLined, Google Inc
* Thierry Zoller working with the ZDI and Robert Swiecki of the Google Security Team
* Chris Evans of Google Inc
12) Dean McNamee, Google Inc
13) Jesse Ruderman, Mozilla Corporation
14) SkyLined of Google Inc
15) Adam Barth of UC Berkeley and Collin Jackson of Stanford University
17) Thierry Zoller, G-SEC
18) Chris Evans
19) Feng Qian, Google Inc
20) Per von Zweigbergk
21) wushi & ling of team509 working with the ZDI
22) Adam Barth and Joel Weinberger of UC Berkeley
Original Advisory: Apple:
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: Apple iPhone / iPod touch Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.