First published: Sat Oct 06 2012(Updated: )
Heap-based buffer overflow in the receive_packet function in libusbmuxd/libusbmuxd.c in usbmuxd 1.0.5 through 1.0.7 allows physically proximate attackers to execute arbitrary code via a long SerialNumber field in a property list.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libusbmuxd | =1.0.5 | |
libusbmuxd | =1.0.6 | |
libusbmuxd | =1.0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0065 is classified as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2012-0065, update libusbmuxd to a version higher than 1.0.7.
CVE-2012-0065 affects users running libusbmuxd versions 1.0.5, 1.0.6, and 1.0.7.
CVE-2012-0065 is a heap-based buffer overflow vulnerability.
CVE-2012-0065 can be exploited by physically proximate attackers using crafted data.