Secunia Advisory: SA28497
Release Date: 2008-01-16
Critical: Highly critical
Impact: Security Bypass
Cross Site Scripting
System access
Where: From remote
Solution Status: Vendor Patch
OS: Apple iPhone 1.x
Apple iPod touch 1.x
CVE reference:
CVE-2007-5858 (Secunia mirror)
CVE-2008-0034 (Secunia mirror)
CVE-2008-0035 (Secunia mirror)
Description:
Two vulnerabilities and a security issue have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, or to compromise a vulnerable device.
1) An unspecified error in the handling of URLs exists in Safari. This can be exploited to cause a memory corruption when a user is enticed to access a specially crafted URL.
Successful exploitation may allow execution of arbitrary code.
2) An error in the handling of emergency calls can be exploited to bypass the Passcode Lock feature and allows users with physical access to an iPhone to launch applications without the passcode.
This security issue is reported in iPhone v1.0 through v1.1.2 only.
3) An error in Safari can be exploited by malicious people to conduct cross-site scripting attacks.
For more information see vulnerability #21 in:
SA28136
Solution:
Update to version 1.1.3 (downloadable and installable via iTunes).
Bollettino di Sicurezza
Release Date: 2008-01-16
Critical: Highly critical
Impact: Security Bypass
Cross Site Scripting
System access
Where: From remote
Solution Status: Vendor Patch
OS: Apple iPhone 1.x
Apple iPod touch 1.x
CVE reference:
CVE-2007-5858 (Secunia mirror)
CVE-2008-0034 (Secunia mirror)
CVE-2008-0035 (Secunia mirror)
Description:
Two vulnerabilities and a security issue have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, or to compromise a vulnerable device.
1) An unspecified error in the handling of URLs exists in Safari. This can be exploited to cause a memory corruption when a user is enticed to access a specially crafted URL.
Successful exploitation may allow execution of arbitrary code.
2) An error in the handling of emergency calls can be exploited to bypass the Passcode Lock feature and allows users with physical access to an iPhone to launch applications without the passcode.
This security issue is reported in iPhone v1.0 through v1.1.2 only.
3) An error in Safari can be exploited by malicious people to conduct cross-site scripting attacks.
For more information see vulnerability #21 in:
SA28136
Solution:
Update to version 1.1.3 (downloadable and installable via iTunes).
Bollettino di Sicurezza