CVE-2013-3955
Published Jun 5, 2013
Last updated 11 years ago
Overview
- Description
- The get_xattrinfo function in the XNU kernel in Apple iOS 5.x and 6.x through 6.1.3 on iPad devices does not properly validate the header of an AppleDouble file, which might allow local users to cause a denial of service (memory corruption) or have unspecified other impact via an invalid file on an msdosfs filesystem.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.2
- Impact score
- 10
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06980521-B0EA-434D-89AD-A951EAF1D23F" }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3AE6A93-3977-4B32-B2F6-55C94387DDE3" }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E78F1F2C-2BFF-4D55-A754-102D6C42081B" }, { "criteria": "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0A4AF71-8E71-432A-B908-361DAF99F4B9" }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEE0068D-C699-4646-9658-610409925A79" }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87C215DD-BC98-4283-BF13-69556EF7CB78" }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1C3966E-C136-47A9-B5B4-70613756ED27" }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22AD2A1F-A637-47DE-A69F-DAE4ABDFA4BD" }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6D398B8-821B-4DE9-ADF1-4983051F964C" }, { "criteria": "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0CCE5F2-4D32-404B-BAAC-E64F11BD41FB" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:apple:ipad:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAADE29A-712B-4AD5-A78B-6AD537BA9196" }, { "criteria": "cpe:2.3:h:apple:ipad_mini:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BB7BAFA-DEB1-48EA-B11C-1FF0E9019A51" }, { "criteria": "cpe:2.3:h:apple:ipad2:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7BFD4E0-321E-4ECB-82A5-80E9CB6E4EED" } ], "operator": "OR" } ], "operator": "AND" } ]