First published: Fri Nov 11 2011(Updated: )
The kernel in Apple iOS before 5.0.1 does not ensure the validity of flag combinations for an mmap system call, which allows local users to execute arbitrary unsigned code via a crafted app.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iPhone OS | =4.3.2 | |
iPhone OS | =5.0 | |
iPhone OS | =4.3.4 | |
iPhone OS | =4.3.5 | |
iPhone OS | =4.3.1 | |
iPhone OS | =4.3.5 | |
iPhone OS | =4.3.5 | |
iPhone OS | =5.0 | |
iPhone OS | =4.3.3 | |
iPhone OS | =5.0 | |
iPhone OS | =5.0 | |
iPhone OS | =4.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3442 is classified as a high-severity vulnerability due to its potential to allow local users to execute arbitrary unsigned code.
To mitigate CVE-2011-3442, update your Apple iOS to version 5.0.1 or later.
CVE-2011-3442 affects Apple iOS versions 4.3.0 to 5.0, including iPhones, iPads, and iPod Touch devices.
No, CVE-2011-3442 can only be exploited locally by users with access to the affected device.
CVE-2011-3442 impacts various Apple devices running iOS, including iPhones, iPads, and iPod Touch models.