SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Other)  >   Apple iOS Vendors:   Apple
Apple iOS Bugs Let Local Users Access Potentially Sensitive Information
SecurityTracker Alert ID:  1038139
SecurityTracker URL:  http://securitytracker.com/id/1038139
CVE Reference:   CVE-2017-2384, CVE-2017-2393, CVE-2017-2397, CVE-2017-2399, CVE-2017-2400, CVE-2017-2404, CVE-2017-2412, CVE-2017-2414, CVE-2017-2434, CVE-2017-2452, CVE-2017-2484   (Links to External Site)
Date:  Mar 28 2017
Impact:   Disclosure of authentication information, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 10.3
Description:   Multiple vulnerabilities were reported in Apple iOS. A remote user can modify data on the target system. A local user can obtain potentially sensitive information. A remote user can conduct cross-site scripting attacks.

A local user can exploit an SQLite deletion flaw to determine websites visited in Private Browsing mode [CVE-2017-2384].

A physically local user can exploit a flaw in Siri to obtain text message contents when the device is locked [CVE-2017-2452].

A physically local user can exploit an iCloud authentication bug to view the target user's Apple ID from the lock screen [CVE-2017-2397].

A physically local user can read the pasteboard on the target device [CVE-2017-2399].

When the Safari Reader feature is enabled for a specially crafted webpage, a remote user can conduct cross-site scripting attacks [CVE-2017-2393].

The system may not properly clear the Safari cache [CVE-2017-2400].

A remote user can create a specially crafted PDF document with an embedded 'tel' link that, when tapped by the target user, will initiate a phone call without a user confirmation prompt [CVE-2017-2404].

A remote user that can monitor the network can monitor and modify data sent to iTunes sandbox web services [CVE-2017-2412].

The system may connect to a server different than expected when the user configures an Exchange account with a mistyped email address [CVE-2017-2414].

The Home Control may unexpectedly appear on Control Center [CVE-2017-2434].

An application can initiate a phone call without a user configuration prompt [CVE-2017-2484].

Abhinav Bansal of Zscaler, Inc., Erling Ellingsen, Hunter Byrnes, Ilya Nesterov and Maxim Goncharov, Richard Shupak (linkedin.com/in/rshupak), Suprovici Vadim of UniApps team, an anonymous researcher, Suyash Narain of India, Tuan Anh Ngo (Melbourne, Australia), and Christoph Nehring reported these vulnerabilities.

Impact:   A remote user can access and modify certain iTunes data.

A local user can obtain potentially sensitive information on the target system.

A remote user can conduct cross-site scripting attacks.

Solution:   The vendor has issued a fix (10.3).

The vendor advisory is available at:

https://support.apple.com/en-us/HT207617

Vendor URL:  support.apple.com/en-us/HT207617 (Links to External Site)
Cause:   Access control error, Input validation error, State error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC