CVE-2011-3442
Published Nov 11, 2011
Last updated 13 years ago
Overview
- Description
- The kernel in Apple iOS before 5.0.1 does not ensure the validity of flag combinations for an mmap system call, which allows local users to execute arbitrary unsigned code via a crafted app.
- Source
- product-security@apple.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-399
Evaluator
- Comment
- -
- Impact
- Per: http://support.apple.com/kb/HT5052 'This issue does not affect devices running iOS prior to version 4.3.'
- Solution
- Per: http://support.apple.com/kb/HT5052 'This issue does not affect devices running iOS prior to version 4.3.'
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7252935C-E421-4339-B61F-0299E28888DA" }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9DD342BF-096A-4082-B700-19629F2BDE87" }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "93141AB6-26F2-4C6D-95B3-D383EABB4034" }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D5C61FF-7CD3-410A-94F2-5DE701466B1F" }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EF21ABCB-7CAC-467F-A6B6-06AC2E5CB5EE" }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28A01C87-B02A-4239-8340-B396D0E6B21C" }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.5:-:ipad:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "396634C5-774C-4131-B927-3CAD239EF0B3" }, { "criteria": "cpe:2.3:o:apple:iphone_os:4.3.5:-:ipodtouch:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64FF0F29-B3C2-4BDC-89FF-DBEDE87D64A4" }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06980521-B0EA-434D-89AD-A951EAF1D23F" }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.0:-:ipad:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10A0C8B7-D7E0-4CE7-AB4D-FE7AD74B8E67" }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.0:-:iphone:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7313FB15-4EF4-4775-BBE3-B46E803BE5A6" }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.0:-:ipodtouch:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E643CBB2-E0B3-4E5A-B99D-A15D6874A52B" } ], "operator": "OR" } ] } ]