var-201103-0263
Vulnerability from variot
Wi-Fi in Apple iOS before 4.3 and Apple TV before 4.2 does not properly perform bounds checking for Wi-Fi frames, which allows remote attackers to cause a denial of service (device reset) via unspecified traffic on the local wireless network. Apple iOS is the latest operating system that runs on Apple iPhone and iPod touch devices. Apple iOS has a boundary check error when processing Wi-Fi frames. When connected to WI-FI, an attacker on the same network segment can restart the device. Multiple Apple products are prone to a remote denial-of-service vulnerability when connected to a Wi-Fi network. This issue is related to insufficient bounds-checking on certain Wi-Fi frames. Attackers on the same network can exploit this issue to cause the affected device to reset, denying service to legitimate users
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201103-0263", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "tv", "scope": "eq", "trust": 2.7, "vendor": "apple", "version": "4.0" }, { "model": "tv", "scope": "eq", "trust": 1.7, "vendor": "apple", "version": "4.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "1.1.5" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "2.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "2.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "2.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.2" }, { "model": "iphone os", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "4.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0.2" }, { "model": "tvos", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.1.0" }, { "model": "tvos", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0" }, { "model": "tvos", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0.1" }, { "model": "tvos", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "3.0.2" }, { "model": "tvos", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.2" }, { "model": "tvos", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.0" }, { "model": "tvos", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.4" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "4.2.1" }, { "model": "ios beta", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "4.1" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "4.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "2.0" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "2.1" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "3.2" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "3.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "3.2.2" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "4.0.2" }, { "model": "ios", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "4" }, { "model": "ipod touch", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "0" }, { "model": "iphone", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "0" }, { "model": "ipad", "scope": "eq", "trust": 0.9, "vendor": "apple", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.0 to 4.2.1 (iphone 3gs after )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.1 to 4.2.1 (ipod touch (3rd generation) after )" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "3.2 to 4.2.1 (ipad for )" }, { "model": "ipad", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "iphone", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "tv", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "4.2" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1002" }, { "db": "BID", "id": "46813" }, { "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "db": "CNNVD", "id": "CNNVD-201103-187" }, { "db": "NVD", "id": "CVE-2011-0162" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:apple:apple_tv", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:iphone_os", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipad", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:iphone", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipod_touch", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001372" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Scott Boyd of ePlus Technology, inc.", "sources": [ { "db": "BID", "id": "46813" } ], "trust": 0.3 }, "cve": "CVE-2011-0162", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2011-0162", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-48107", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-0162", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-0162", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201103-187", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-48107", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-48107" }, { "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "db": "CNNVD", "id": "CNNVD-201103-187" }, { "db": "NVD", "id": "CVE-2011-0162" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wi-Fi in Apple iOS before 4.3 and Apple TV before 4.2 does not properly perform bounds checking for Wi-Fi frames, which allows remote attackers to cause a denial of service (device reset) via unspecified traffic on the local wireless network. Apple iOS is the latest operating system that runs on Apple iPhone and iPod touch devices. Apple iOS has a boundary check error when processing Wi-Fi frames. When connected to WI-FI, an attacker on the same network segment can restart the device. Multiple Apple products are prone to a remote denial-of-service vulnerability when connected to a Wi-Fi network. This issue is related to insufficient bounds-checking on certain Wi-Fi frames. \nAttackers on the same network can exploit this issue to cause the affected device to reset, denying service to legitimate users", "sources": [ { "db": "NVD", "id": "CVE-2011-0162" }, { "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "db": "CNVD", "id": "CNVD-2011-1002" }, { "db": "BID", "id": "46813" }, { "db": "VULHUB", "id": "VHN-48107" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-0162", "trust": 3.4 }, { "db": "BID", "id": "46813", "trust": 2.8 }, { "db": "SECTRACK", "id": "1025182", "trust": 2.5 }, { "db": "XF", "id": "65998", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-001372", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201103-187", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2011-1002", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-48107", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1002" }, { "db": "VULHUB", "id": "VHN-48107" }, { "db": "BID", "id": "46813" }, { "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "db": "CNNVD", "id": "CNNVD-201103-187" }, { "db": "NVD", "id": "CVE-2011-0162" } ] }, "id": "VAR-201103-0263", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-48107" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:02:21.815000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4564", "trust": 0.8, "url": "http://support.apple.com/kb/HT4564" }, { "title": "HT4565", "trust": 0.8, "url": "http://support.apple.com/kb/HT4565" }, { "title": "HT4564", "trust": 0.8, "url": "http://support.apple.com/kb/HT4564?viewlocale=ja_JP" }, { "title": "HT4565", "trust": 0.8, "url": "http://support.apple.com/kb/HT4565?viewlocale=ja_JP" }, { "title": "Patch for Apple Multiple Products WI-FI Frame Boundary Check Remote Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/3248" }, { "title": "Apple iOS and TV Wi-Fi Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=90712" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1002" }, { "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "db": "CNNVD", "id": "CNNVD-201103-187" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-48107" }, { "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "db": "NVD", "id": "CVE-2011-0162" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/46813" }, { "trust": 2.5, "url": "http://www.securitytracker.com/id?1025182" }, { "trust": 2.3, "url": "http://support.apple.com/kb/ht4564" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2011//mar/msg00003.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2011//mar/msg00005.html" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht4565" }, { "trust": 1.7, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65998" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0162" }, { "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/65998" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu867452" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu574588" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0162" }, { "trust": 0.3, "url": "http://www.apple.com/appletv/features.html" }, { "trust": 0.3, "url": "http://www.apple.com/iphone/softwareupdate/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2011-1002" }, { "db": "VULHUB", "id": "VHN-48107" }, { "db": "BID", "id": "46813" }, { "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "db": "CNNVD", "id": "CNNVD-201103-187" }, { "db": "NVD", "id": "CVE-2011-0162" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2011-1002" }, { "db": "VULHUB", "id": "VHN-48107" }, { "db": "BID", "id": "46813" }, { "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "db": "CNNVD", "id": "CNNVD-201103-187" }, { "db": "NVD", "id": "CVE-2011-0162" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-10T00:00:00", "db": "CNVD", "id": "CNVD-2011-1002" }, { "date": "2011-03-11T00:00:00", "db": "VULHUB", "id": "VHN-48107" }, { "date": "2011-03-09T00:00:00", "db": "BID", "id": "46813" }, { "date": "2011-04-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "date": "2011-03-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201103-187" }, { "date": "2011-03-11T22:55:03.057000", "db": "NVD", "id": "CVE-2011-0162" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-03-10T00:00:00", "db": "CNVD", "id": "CNVD-2011-1002" }, { "date": "2019-03-08T00:00:00", "db": "VULHUB", "id": "VHN-48107" }, { "date": "2015-03-19T09:04:00", "db": "BID", "id": "46813" }, { "date": "2011-04-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001372" }, { "date": "2019-03-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201103-187" }, { "date": "2024-11-21T01:23:27.097000", "db": "NVD", "id": "CVE-2011-0162" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201103-187" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Apple Product Wi-Fi Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001372" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation", "sources": [ { "db": "CNNVD", "id": "CNNVD-201103-187" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.