Vulnerability Name: | CVE-2012-0646 (CCN-73882) |
Assigned: | 2012-03-07 |
Published: | 2012-03-07 |
Updated: | 2018-11-29 |
Summary: | Format string vulnerability in VPN in Apple iOS before 5.1 allows remote attackers to execute arbitrary code via a crafted racoon configuration file.
|
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-134
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2012-0646
Source: APPLE Type: Mailing List, Vendor Advisory APPLE-SA-2012-03-07-2
Source: CCN Type: APPLE-SA-2012-03-07-2 iOS 5.1 Software Update
Source: CCN Type: SA48288 Apple iOS Multiple Vulnerabilities
Source: SECUNIA Type: Third Party Advisory 48288
Source: CCN Type: OSVDB ID: 79974 Apple iOS Racoon Configuration File Handling Format String
Source: CCN Type: BID-52364 Apple iPhone/iPad/iPod touch Prior to iOS 5.1 Multiple Vulnerabilities
Source: SECTRACK Type: Third Party Advisory, VDB Entry 1026774
Source: XF Type: UNKNOWN appleios-vpn-format-string(73882)
|
Vulnerable Configuration: | Configuration 1: cpe:/o:apple:iphone_os:*:*:*:*:*:*:*:* (Version < 5.1) Configuration CCN 1: cpe:/o:apple:iphone_os:3.1:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.0:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.0.1:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.0.1:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:ios:4.0.2:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.0:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:ios:4.2.1:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.3.2:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.3.1:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.3.3:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.2.5:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.2.8:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.3.0:*:*:*:*:*:*:*OR cpe:/o:apple:ios:5.0:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.0:-:iphone:*:*:*:*:*OR cpe:/o:apple:ios:4.0.1:-:iphone:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.2:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.2:-:iphone:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.2.1:-:ipad:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.1:-:iphone:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.1.3:-:iphone:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.1.2:-:iphone:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.0:-:iphone:*:*:*:*:*OR cpe:/o:apple:ios:4.3.5:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.3.5:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:ios:4.3.5:-:ipad:*:*:*:*:*OR cpe:/o:apple:ios:5.0.1:*:*:*:*:*:*:*OR cpe:/o:apple:ios:5.0.1:-:ipad:*:*:*:*:*OR cpe:/o:apple:ios:5.0.1:-:iphone:*:*:*:*:*OR cpe:/o:apple:ios:5.0.1:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:ios:5.0:-:ipad:*:*:*:*:*OR cpe:/o:apple:ios:5.0:-:iphone:*:*:*:*:*OR cpe:/o:apple:ios:5.0:-:ipodtouch:*:*:*:*:*
Denotes that component is vulnerable |
BACK |