- Učlanjen(a)
- 24.07.2009
- Poruke
- 205
- Poena
- 169
Rated as Critical
Technical Description
Two vulnerabilities have been identified in Apple iOS for iPhone, iPad and iPod, which could be exploited by remote attackers to take complete control of a vulnerable device.
The first issue is caused by a memory corruption error when processing Compact Font Format (CFF) data within a PDF document, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page using Mobile Safari.
The second vulnerability is caused by an error in the kernel, which could allow attackers to gain elevated privileges and bypass sandbox restrictions.
Note: These flaws are currently being exploited by jailbreakme to remotely jailbreak Apple devices. The website redirects the browser to the appropriate PDF exploit file depending on the device model and version and then executes a first stage payload. Once done, a second stage payload is executed to gain root privileges on the device by exploiting the kernel vulnerability.
Affected Products
Apple iPhone OS (iOS) versions 4.x
Apple iPhone OS (iOS) versions 3.x
Apple iPod OS (iOS) versions 4.x
Apple iPod OS (iOS) versions 3.x
Apple iPad OS (iOS) versions 3.x
Solution
VUPEN Security is not aware of any vendor-supplied patch.
http://www.vupen.com/english/advisories/2010/1992
http://www.avertlabs.com/research/b...ing-pdf-exploit-should-serve-as-wake-up-call/
Technical Description
Two vulnerabilities have been identified in Apple iOS for iPhone, iPad and iPod, which could be exploited by remote attackers to take complete control of a vulnerable device.
The first issue is caused by a memory corruption error when processing Compact Font Format (CFF) data within a PDF document, which could be exploited by attackers to execute arbitrary code by tricking a user into visiting a specially crafted web page using Mobile Safari.
The second vulnerability is caused by an error in the kernel, which could allow attackers to gain elevated privileges and bypass sandbox restrictions.
Note: These flaws are currently being exploited by jailbreakme to remotely jailbreak Apple devices. The website redirects the browser to the appropriate PDF exploit file depending on the device model and version and then executes a first stage payload. Once done, a second stage payload is executed to gain root privileges on the device by exploiting the kernel vulnerability.
Affected Products
Apple iPhone OS (iOS) versions 4.x
Apple iPhone OS (iOS) versions 3.x
Apple iPod OS (iOS) versions 4.x
Apple iPod OS (iOS) versions 3.x
Apple iPad OS (iOS) versions 3.x
Solution
VUPEN Security is not aware of any vendor-supplied patch.
http://www.vupen.com/english/advisories/2010/1992
http://www.avertlabs.com/research/b...ing-pdf-exploit-should-serve-as-wake-up-call/
Poslednja izmena: