Vulnerability Details : CVE-2013-0964
The kernel in Apple iOS before 6.1 and Apple TV before 5.2 does not properly validate copyin and copyout arguments, which allows local users to bypass intended pointer restrictions and access locations in the first kernel-memory page by specifying a length of less than one page.
Vulnerability category: Input validation
Exploit prediction scoring system (EPSS) score for CVE-2013-0964
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-0964
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
3.6
|
LOW | AV:L/AC:L/Au:N/C:P/I:P/A:N |
3.9
|
4.9
|
nvd@nist.gov |
CWE ids for CVE-2013-0964
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-0964
-
http://lists.apple.com/archives/security-announce/2013/Jan/msg00001.html
Apple - Lists.apple.comVendor Advisory
-
http://www.securityfocus.com/bid/57595
Apple iPhone/iPad/iPod touch Prior to iOS 6.1 Information Disclosure Vulnerability
-
http://lists.apple.com/archives/security-announce/2013/Jan/msg00000.html
Apple - Lists.apple.comVendor Advisory
-
http://support.apple.com/kb/HT5643
About the security content of Apple TV 5.2 - Apple SupportVendor Advisory
-
http://support.apple.com/kb/HT5642
About the security content of iOS 6.1 Software Update - Apple SupportVendor Advisory
Products affected by CVE-2013-0964
- cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:2.4.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.4.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:5.1.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.4.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:tvos:4.2.0:*:*:*:*:*:*:*