Secunia Advisory: SA31823
Critical: Highly critical
Impact: Hijacking
Security Bypass
Spoofing
Exposure of sensitive information
System access
Where: From remote
Solution Status: Vendor Patch
OS: Apple iPod touch
CVE reference:
CVE-2008-1447
CVE-2008-1806
CVE-2008-1807
CVE-2008-1808
CVE-2008-3612
CVE-2008-3631
CVE-2008-3632
Description:
Multiple vulnerabilities have been reported in Apple iPod touch, which can be exploited by malicious applications to bypass certain security features and by malicious people to poison the DNS cache, spoof TCP connections, or potentially compromise a user's device.
1) An error in the application sandbox causes it to not properly enforce access restrictions between third-party applications. This can be exploited by one application to read another application's files.
2) Multiple errors exist in the included version of FreeType, which potentially can be exploited by malicious people to execute arbitrary code when accessing specially crafted font data.
For more information:
SA30600
3) mDNSResponder does not provide sufficient randomization, which can be exploited to poison the DNS cache.
For more information:
SA30973
4) Generation of predictable TCP initial sequence numbers can be exploited to spoof TCP connections or hijack sessions.
5) A use-after-free error in WebKit when handling CSS import statements can potentially be exploited to execute arbitrary code via a specially crafted website.
Solution:
Update to version 2.1.
Bollettino Sicurezza
Critical: Highly critical
Impact: Hijacking
Security Bypass
Spoofing
Exposure of sensitive information
System access
Where: From remote
Solution Status: Vendor Patch
OS: Apple iPod touch
CVE reference:
CVE-2008-1447
CVE-2008-1806
CVE-2008-1807
CVE-2008-1808
CVE-2008-3612
CVE-2008-3631
CVE-2008-3632
Description:
Multiple vulnerabilities have been reported in Apple iPod touch, which can be exploited by malicious applications to bypass certain security features and by malicious people to poison the DNS cache, spoof TCP connections, or potentially compromise a user's device.
1) An error in the application sandbox causes it to not properly enforce access restrictions between third-party applications. This can be exploited by one application to read another application's files.
2) Multiple errors exist in the included version of FreeType, which potentially can be exploited by malicious people to execute arbitrary code when accessing specially crafted font data.
For more information:
SA30600
3) mDNSResponder does not provide sufficient randomization, which can be exploited to poison the DNS cache.
For more information:
SA30973
4) Generation of predictable TCP initial sequence numbers can be exploited to spoof TCP connections or hijack sessions.
5) A use-after-free error in WebKit when handling CSS import statements can potentially be exploited to execute arbitrary code via a specially crafted website.
Solution:
Update to version 2.1.
Bollettino Sicurezza