CVE-2012-3738 (GCVE-0-2012-3738)

Vulnerability from cvelistv5 – Published: 2012-09-20 21:00 – Updated: 2024-08-06 20:13
VLAI?
Summary
The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voice Dialing, or obtain sensitive contact information by attempting to make a FaceTime call and reading the contact suggestions.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://lists.apple.com/archives/security-announce… vendor-advisoryx_refsource_APPLE
http://support.apple.com/kb/HT5503 x_refsource_CONFIRM
http://osvdb.org/85620 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:13:51.631Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "APPLE-SA-2012-09-19-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.apple.com/kb/HT5503"
          },
          {
            "name": "85620",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/85620"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-09-19T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voice Dialing, or obtain sensitive contact information by attempting to make a FaceTime call and reading the contact suggestions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-03-26T09:00:00",
        "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
        "shortName": "apple"
      },
      "references": [
        {
          "name": "APPLE-SA-2012-09-19-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.apple.com/kb/HT5503"
        },
        {
          "name": "85620",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/85620"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "product-security@apple.com",
          "ID": "CVE-2012-3738",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voice Dialing, or obtain sensitive contact information by attempting to make a FaceTime call and reading the contact suggestions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "APPLE-SA-2012-09-19-1",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html"
            },
            {
              "name": "http://support.apple.com/kb/HT5503",
              "refsource": "CONFIRM",
              "url": "http://support.apple.com/kb/HT5503"
            },
            {
              "name": "85620",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/85620"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
    "assignerShortName": "apple",
    "cveId": "CVE-2012-3738",
    "datePublished": "2012-09-20T21:00:00",
    "dateReserved": "2012-06-19T00:00:00",
    "dateUpdated": "2024-08-06T20:13:51.631Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"5.1.1\", \"matchCriteriaId\": \"5D142713-9169-4589-9487-E7211F25509B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E28FB0CB-D636-4F85-B5F7-70EC30053925\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9EC16D1C-065A-4D1A-BA6E-528A71DF65CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"27319629-171F-42AA-A95F-2D71F78097D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"297F9438-0F04-4128-94A8-A504B600929E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8618621-F871-4531-9F6C-7D60F2BF8B75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"824DED2D-FA1D-46FC-8252-6E25546DAE29\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1641DDFA-3BF1-467F-8EC3-98114FF9F07B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D06D54D-97FD-49FD-B251-CC86FBA68CA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25A5D868-0016-44AB-80E6-E5DF91F15455\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863383DA-0BC6-4A96-835A-A96128EC0202\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51D3BE2B-5A01-4AD4-A436-0056B50A535D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A20F171-79FE-43B9-8309-B18341639FA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"126EF22D-29BC-4366-97BC-B261311E6251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A939B80-0AD0-48AF-81A7-370716F56639\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D28528CE-4943-4F82-80C0-A629DA3E6702\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12E22AF0-2B66-425A-A1EE-4F0E3B0433E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB34ECBE-33E8-40E1-936B-7800D2525AE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"107C59BE-D8CF-4A17-8DFB-BED2AB12388D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36C86BB9-0328-4E34-BC2B-47B3471EC262\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A54A8681-2D8A-4B0B-A947-82F3CE1FB03C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0070D83-2E27-4DA8-8D10-A6A697216F36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C9ACA63-4528-4090-B1EA-1FE57A6B0555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7252935C-E421-4339-B61F-0299E28888DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DD342BF-096A-4082-B700-19629F2BDE87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93141AB6-26F2-4C6D-95B3-D383EABB4034\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D5C61FF-7CD3-410A-94F2-5DE701466B1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28A01C87-B02A-4239-8340-B396D0E6B21C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06980521-B0EA-434D-89AD-A951EAF1D23F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3AE6A93-3977-4B32-B2F6-55C94387DDE3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E78F1F2C-2BFF-4D55-A754-102D6C42081B\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voice Dialing, or obtain sensitive contact information by attempting to make a FaceTime call and reading the contact suggestions.\"}, {\"lang\": \"es\", \"value\": \"La pantalla \\\"Marcador de Emergencia\\\" en la implementaci\\u00f3n del \\\"Bloqueo con c\\u00f3digo\\\" en Apple iOS antes de v6 no limita adecuadamente los m\\u00e9todos de marcaci\\u00f3n, lo que permite  eludir las restricciones de acceso a atacantes f\\u00edsicamente pr\\u00f3ximos y realizar llamadas FaceTime a trav\\u00e9s de la marcaci\\u00f3n por voz, u obtener informaci\\u00f3n sensible del contacto al intentar hacer una llamada FaceTime y leer las sugerencias del contacto.\\r\\n\"}]",
      "id": "CVE-2012-3738",
      "lastModified": "2024-11-21T01:41:34.167",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:N\", \"baseScore\": 3.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 3.9, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2012-09-20T21:55:04.093",
      "references": "[{\"url\": \"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://osvdb.org/85620\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://support.apple.com/kb/HT5503\", \"source\": \"product-security@apple.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://osvdb.org/85620\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.apple.com/kb/HT5503\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "product-security@apple.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-3738\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2012-09-20T21:55:04.093\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Emergency Dialer screen in the Passcode Lock implementation in Apple iOS before 6 does not properly limit the dialing methods, which allows physically proximate attackers to bypass intended access restrictions and make FaceTime calls through Voice Dialing, or obtain sensitive contact information by attempting to make a FaceTime call and reading the contact suggestions.\"},{\"lang\":\"es\",\"value\":\"La pantalla \\\"Marcador de Emergencia\\\" en la implementaci\u00f3n del \\\"Bloqueo con c\u00f3digo\\\" en Apple iOS antes de v6 no limita adecuadamente los m\u00e9todos de marcaci\u00f3n, lo que permite  eludir las restricciones de acceso a atacantes f\u00edsicamente pr\u00f3ximos y realizar llamadas FaceTime a trav\u00e9s de la marcaci\u00f3n por voz, u obtener informaci\u00f3n sensible del contacto al intentar hacer una llamada FaceTime y leer las sugerencias del contacto.\\r\\n\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.1.1\",\"matchCriteriaId\":\"5D142713-9169-4589-9487-E7211F25509B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7B6D035-38A9-4C0B-9A9D-CAE3BF1CA56D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28FB0CB-D636-4F85-B5F7-70EC30053925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC16D1C-065A-4D1A-BA6E-528A71DF65CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27319629-171F-42AA-A95F-2D71F78097D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297F9438-0F04-4128-94A8-A504B600929E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8618621-F871-4531-9F6C-7D60F2BF8B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"824DED2D-FA1D-46FC-8252-6E25546DAE29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1641DDFA-3BF1-467F-8EC3-98114FF9F07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D06D54D-97FD-49FD-B251-CC86FBA68CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25A5D868-0016-44AB-80E6-E5DF91F15455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C14EEA4-6E35-4EBE-9A43-8F6D69318BA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B15E90AE-2E15-4BC2-B0B8-AFA2B1297B03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E0C0A8D-3DDD-437A-BB3D-50FAEAF6C440\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863383DA-0BC6-4A96-835A-A96128EC0202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFF5BE7-2BF6-48CE-B74B-B1A05383C10F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51D3BE2B-5A01-4AD4-A436-0056B50A535D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A20F171-79FE-43B9-8309-B18341639FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"126EF22D-29BC-4366-97BC-B261311E6251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B3DD7B3-DA4C-4B0A-A94E-6BF66B358B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A939B80-0AD0-48AF-81A7-370716F56639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D28528CE-4943-4F82-80C0-A629DA3E6702\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12E22AF0-2B66-425A-A1EE-4F0E3B0433E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB34ECBE-33E8-40E1-936B-7800D2525AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"107C59BE-D8CF-4A17-8DFB-BED2AB12388D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36C86BB9-0328-4E34-BC2B-47B3471EC262\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A54A8681-2D8A-4B0B-A947-82F3CE1FB03C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0070D83-2E27-4DA8-8D10-A6A697216F36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C9ACA63-4528-4090-B1EA-1FE57A6B0555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7252935C-E421-4339-B61F-0299E28888DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DD342BF-096A-4082-B700-19629F2BDE87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93141AB6-26F2-4C6D-95B3-D383EABB4034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D5C61FF-7CD3-410A-94F2-5DE701466B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A01C87-B02A-4239-8340-B396D0E6B21C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06980521-B0EA-434D-89AD-A951EAF1D23F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3AE6A93-3977-4B32-B2F6-55C94387DDE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E78F1F2C-2BFF-4D55-A754-102D6C42081B\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/85620\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://support.apple.com/kb/HT5503\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/85620\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT5503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…