Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2013-0978

Disclosure Date: March 20, 2013 (last updated October 05, 2023)
The ARM prefetch abort handler in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not ensure that it has been invoked in an abort context, which makes it easier for local users to bypass the ASLR protection mechanism via crafted code.
0
Attacker Value
Unknown

CVE-2013-0981

Disclosure Date: March 20, 2013 (last updated October 05, 2023)
The IOUSBDeviceFamily driver in the USB implementation in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 accesses pipe object pointers that originated in userspace, which allows local users to gain privileges via crafted code.
0
Attacker Value
Unknown

CVE-2013-0977

Disclosure Date: March 20, 2013 (last updated October 05, 2023)
dyld in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not properly manage the state of file loading for Mach-O executable files, which allows local users to bypass intended code-signing requirements via a file that contains overlapping segments.
0
Attacker Value
Unknown

CVE-2013-0964

Disclosure Date: January 29, 2013 (last updated October 05, 2023)
The kernel in Apple iOS before 6.1 and Apple TV before 5.2 does not properly validate copyin and copyout arguments, which allows local users to bypass intended pointer restrictions and access locations in the first kernel-memory page by specifying a length of less than one page.
0
Attacker Value
Unknown

CVE-2011-0162

Disclosure Date: March 11, 2011 (last updated October 04, 2023)
Wi-Fi in Apple iOS before 4.3 and Apple TV before 4.2 does not properly perform bounds checking for Wi-Fi frames, which allows remote attackers to cause a denial of service (device reset) via unspecified traffic on the local wireless network.
0
Attacker Value
Unknown

CVE-2011-1418

Disclosure Date: March 11, 2011 (last updated October 04, 2023)
The stateless address autoconfiguration (aka SLAAC) functionality in the IPv6 networking implementation in Apple iOS before 4.3 and Apple TV before 4.2 places the MAC address into the IPv6 address, which makes it easier for remote IPv6 servers to track users by logging source IPv6 addresses.
0