mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
178 lines
5.8 KiB
JSON
178 lines
5.8 KiB
JSON
{
|
|
"id": "CVE-2008-4229",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2008-11-25T23:30:00.407",
|
|
"lastModified": "2022-08-09T13:48:58.163",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Race condition in the Passcode Lock feature in Apple iPhone OS 2.0 through 2.1 and iPhone OS for iPod touch 2.0 through 2.1 allows physically proximate attackers to remove the lock and launch arbitrary applications by restoring the device from a backup."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Condici\u00f3n de carrera en la funcionalidad Passcode Lock de Apple Iphone OS v2.0 hasta v2.1 e iPhone OS para iPod touch v2.0 hasta v2.1, permite a atacantes f\u00edsicamente pr\u00f3ximos eliminar el bloqueo y lanzar aplicaciones de su elecci\u00f3n al restaurar el dispositivo desde una copia de seguridad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "HIGH",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 3.7
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 1.9,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-362"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "88FA2602-DDAB-4E23-A3D2-FB712970AAD1"
|
|
},
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "340C4071-1447-477F-942A-8E09EA29F917"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "41DB23F0-7226-4D0B-A3FA-A801F02EBA6B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0C5B94E7-2C24-4913-B65E-8D8A0DE2B80B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E28FB0CB-D636-4F85-B5F7-70EC30053925"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B4AEDE82-E317-4066-A34F-BB3BCD3F53E2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "27319629-171F-42AA-A95F-2D71F78097D0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4F7AEFAB-7BB0-40D8-8BA5-71B374EB69DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "297F9438-0F04-4128-94A8-A504B600929E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F8618621-F871-4531-9F6C-7D60F2BF8B75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "824DED2D-FA1D-46FC-8252-6E25546DAE29"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1641DDFA-3BF1-467F-8EC3-98114FF9F07B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D61644E2-7AF5-48EF-B3D5-59C7B2AD1A58"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3D06D54D-97FD-49FD-B251-CC86FBA68CA6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "25A5D868-0016-44AB-80E6-E5DF91F15455"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2008/Nov/msg00002.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://support.apple.com/kb/HT3318",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/32394",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1021271",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2008/3232",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |