Vulnerability Name:
CVE-2010-3828 (CCN-63417)
Assigned:
2010-11-22
Published:
2010-11-22
Updated:
2017-08-17
Summary:
iAd Content Display in Apple iOS before 4.2 allows man-in-the-middle attackers to make calls via a crafted URL in an ad.
CVSS v3 Severity:
5.3 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
4.3 Medium
(CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
)
3.2 Low
(Temporal CVSS v2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
5.0 Medium
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
)
3.7 Low
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-Other
Vulnerability Consequences:
Bypass Security
References:
Source: MITRE
Type: CNA
CVE-2010-3828
Source: APPLE
Type: Vendor Advisory
APPLE-SA-2010-11-22-1
Source: CCN
Type: SA42312
Apple iOS Multiple Vulnerabilities
Source: CCN
Type: SA42314
Apple iOS Multiple Vulnerabilities
Source: SECUNIA
Type: UNKNOWN
42314
Source: CCN
Type: SECTRACK ID: 1024768
Apple iOS Bugs Let Remote Users Initiate Calls and Bypass Configuration Profile Signature Validation
Source: CCN
Type: Apple Web site
About the security content of iOS 4.2
Source: CONFIRM
Type: Patch, Vendor Advisory
http://support.apple.com/kb/HT4456
Source: CCN
Type: OSVDB ID: 69498
Apple iOS iAd Content Display Crafted Ad URL MiTM Calling Weakness
Source: CCN
Type: BID-45007
Apple iOS iAd Content Display URL Scheme Handling Security Bypass Vulnerability
Source: SECTRACK
Type: UNKNOWN
1024768
Source: VUPEN
Type: UNKNOWN
ADV-2010-3046
Source: XF
Type: UNKNOWN
appleios-iadcontentdisplay-security-bypass(63417)
Source: XF
Type: UNKNOWN
appleios-iadcontentdisplay-security-bypass(63417)
Vulnerable Configuration:
Configuration 1
:
cpe:/o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:ios:4.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:ios:4.0.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:ios:4.0.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:*:*:*:*:*:*:*:*
(Version <= 4.1)
Configuration CCN 1
:
cpe:/o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
OR
cpe:/o:apple:ios:4.0:*:*:*:*:*:*:*
OR
cpe:/o:apple:ios:4.0.1:*:*:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*
OR
cpe:/o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*
OR
cpe:/o:apple:ios:4.0.1:-:ipodtouch:*:*:*:*:*
OR
cpe:/o:apple:ios:4.0:-:ipodtouch:*:*:*:*:*
AND
cpe:/h:apple:ipad:*:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
apple
iphone os 1.0.0
apple
iphone os 1.0.1
apple
iphone os 1.0.2
apple
iphone os 1.1.0
apple
iphone os 1.1.1
apple
iphone os 1.1.2
apple
iphone os 1.1.3
apple
iphone os 1.1.4
apple
iphone os 1.1.5
apple
iphone os 2.0
apple
iphone os 2.0.0
apple
iphone os 2.0.1
apple
iphone os 2.0.2
apple
iphone os 2.1
apple
iphone os 2.1.1
apple
iphone os 2.2
apple
iphone os 2.2.1
apple
iphone os 3.0
apple
iphone os 3.0.1
apple
iphone os 3.1
apple
iphone os 3.1.2
apple
iphone os 3.1.3
apple
iphone os 3.2
apple
iphone os 3.2.1
apple
iphone os 3.2.2
apple
iphone os 4.0
apple
iphone os 4.0.1
apple
iphone os 4.0.2
apple
iphone os *
apple
iphone os 2.0.0 -
apple
iphone os 2.0.1
apple
iphone os 2.0.1 -
apple
iphone os 2.0.2
apple
iphone os 2.0.2 -
apple
iphone os 2.1
apple
iphone os 2.0
apple
iphone os 3.0
apple
iphone os 3.1
apple
iphone os 3.1.2
apple
iphone os 3.1.3
apple
iphone os 4.0
apple
iphone os 4.0.1
apple
iphone os 2.1 -
apple
iphone os 3.0 -
apple
iphone os 3.1.2 -
apple
iphone os 3.1 -
apple
iphone os 4.0.1 -
apple
iphone os 4.0 -
apple
ipad *