mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
269 lines
9.3 KiB
JSON
269 lines
9.3 KiB
JSON
{
|
|
"id": "CVE-2013-0964",
|
|
"sourceIdentifier": "product-security@apple.com",
|
|
"published": "2013-01-29T05:58:54.930",
|
|
"lastModified": "2019-03-08T16:06:28.637",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The kernel in Apple iOS before 6.1 and Apple TV before 5.2 does not properly validate copyin and copyout arguments, which allows local users to bypass intended pointer restrictions and access locations in the first kernel-memory page by specifying a length of less than one page."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "El kernel en Apple iOS anterior a v6.1 y Apple TV anterior a v5.2 no valida adecuadamente los argumentos de copia, lo que permite a usuarior locales evitar las restricciones de punteros y de acceso a memoria en la primera p\u00e1gina del kernel-memory especificando que el tama\u00f1o sea menor al de una p\u00e1gina."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 3.6
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 4.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-20"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "5.1.1",
|
|
"matchCriteriaId": "6DA9B1E7-234E-41C7-AB6E-2DAD2E9745D8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:1.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AED51448-EC2F-4359-AF40-2F64B118B0BE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:1.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "70597B33-FC5E-442A-8C92-69F77A47C672"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B52A3CDB-824F-48B0-81BE-E29E7B330AAB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A0AF6A04-6AA2-4DDE-9843-5CB9AAA0DF56"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B9462F97-9565-4260-8C48-36C025B4A19E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:2.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8410D1D-864A-46A2-B068-999FDC7856C8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:2.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "611A678E-0AFC-4567-B2A5-B55BBAAC8A73"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:2.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "194E34F3-8273-4FC0-993F-94D2347EF02A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:2.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DFC2E304-68A1-4585-80D4-B2539045428F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:2.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "777BB30F-22E3-419E-85B5-C1D9DECEB332"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:3.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C7F51A11-03C4-4016-A341-33A2B62469AD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E336759F-BC13-434D-9317-34645F529102"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:3.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5B89AA38-CBF6-422D-A973-A811DB2E0FD5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "032D6D17-671C-4B41-9156-642D8C7B5E46"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7CAB9BBA-85B3-4EB5-BE4D-2841427D39EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.2.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1694411C-5A09-447B-830C-3FE575E1F3DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39FBA027-1A7F-4EB3-886B-C2050C3E8CBD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BF338C3E-C443-4100-A6DE-6E4F03053CEB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "209A6E35-C8A6-4F85-91EB-4997B34FDC07"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E3CD57F-BE10-4EDB-BB8F-598DEE1FB254"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3607D2B-77F0-447D-905E-260E05D9EC70"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.4.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "81D1802D-320D-48CA-A92A-1F59FE29ADAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:4.4.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D301B9BC-A70A-4B62-A306-81856EBF5081"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:5.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07AAFCEA-1F01-4060-9DB6-1C6D6F036555"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:5.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E82E512A-77C8-4297-86F0-FAB64156BCA1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:5.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0BCF0244-37BC-43E1-AE52-820F4F7830E0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:tvos:5.1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7A752BB3-158D-419D-8670-6B05C82BD262"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "6.0.2",
|
|
"matchCriteriaId": "0FD52712-0484-421B-A5DD-2CF0B4C027BD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DEE0068D-C699-4646-9658-610409925A79"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "87C215DD-BC98-4283-BF13-69556EF7CB78"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2013/Jan/msg00001.html",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://support.apple.com/kb/HT5642",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://support.apple.com/kb/HT5643",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/57595",
|
|
"source": "product-security@apple.com"
|
|
}
|
|
]
|
|
} |