• Non sono ammesse registrazioni con indirizzi email temporanei usa e getta

Apple iPod Touch Multiple Vulnerabilities

ERCOLINO

Membro dello Staff
Amministratore
Registrato
3 Marzo 2003
Messaggi
243.303
Località
Torino
Secunia Advisory: SA31823

Critical: Highly critical
Impact: Hijacking
Security Bypass
Spoofing
Exposure of sensitive information
System access
Where: From remote
Solution Status: Vendor Patch

OS: Apple iPod touch



CVE reference:
CVE-2008-1447
CVE-2008-1806
CVE-2008-1807
CVE-2008-1808
CVE-2008-3612
CVE-2008-3631
CVE-2008-3632


Description:
Multiple vulnerabilities have been reported in Apple iPod touch, which can be exploited by malicious applications to bypass certain security features and by malicious people to poison the DNS cache, spoof TCP connections, or potentially compromise a user's device.

1) An error in the application sandbox causes it to not properly enforce access restrictions between third-party applications. This can be exploited by one application to read another application's files.

2) Multiple errors exist in the included version of FreeType, which potentially can be exploited by malicious people to execute arbitrary code when accessing specially crafted font data.

For more information:
SA30600

3) mDNSResponder does not provide sufficient randomization, which can be exploited to poison the DNS cache.

For more information:
SA30973

4) Generation of predictable TCP initial sequence numbers can be exploited to spoof TCP connections or hijack sessions.

5) A use-after-free error in WebKit when handling CSS import statements can potentially be exploited to execute arbitrary code via a specially crafted website.

Solution:
Update to version 2.1.



Bollettino Sicurezza
 
Indietro
Alto Basso