First published: Wed Mar 20 2013(Updated: )
The ARM prefetch abort handler in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not ensure that it has been invoked in an abort context, which makes it easier for local users to bypass the ASLR protection mechanism via crafted code.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <=6.1.2 | |
Apple iPhone OS | =1.0.0 | |
Apple iPhone OS | =1.0.1 | |
Apple iPhone OS | =1.0.2 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.1 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =2.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1.1 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2.1 | |
Apple iPhone OS | =2.2.1 | |
Apple iPhone OS | =3.0 | |
Apple iPhone OS | =3.0 | |
Apple iPhone OS | =3.0.1 | |
Apple iPhone OS | =3.0.1 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =3.1.2 | |
Apple iPhone OS | =3.1.2 | |
Apple iPhone OS | =3.1.3 | |
Apple iPhone OS | =3.1.3 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.2.2 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.0.2 | |
Apple iPhone OS | =4.1 | |
Apple iPhone OS | =4.2.1 | |
Apple iPhone OS | =4.2.5 | |
Apple iPhone OS | =4.2.8 | |
Apple iPhone OS | =4.3.0 | |
Apple iPhone OS | =4.3.1 | |
Apple iPhone OS | =4.3.2 | |
Apple iPhone OS | =4.3.3 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.1 | |
Apple iPhone OS | =5.1.1 | |
Apple iPhone OS | =6.0 | |
Apple iPhone OS | =6.0.1 | |
Apple iPhone OS | =6.0.2 | |
Apple iPhone OS | =6.1 | |
tvOS | <=5.2.0 | |
tvOS | =1.0.0 | |
tvOS | =1.1.0 | |
tvOS | =2.0.0 | |
tvOS | =2.0.1 | |
tvOS | =2.0.2 | |
tvOS | =2.1.0 | |
tvOS | =2.2.0 | |
tvOS | =2.3.0 | |
tvOS | =2.3.1 | |
tvOS | =2.4.0 | |
tvOS | =3.0.0 | |
tvOS | =3.0.1 | |
tvOS | =3.0.2 | |
tvOS | =4.1.0 | |
tvOS | =4.1.1 | |
tvOS | =4.2.0 | |
tvOS | =4.2.1 | |
tvOS | =4.2.2 | |
tvOS | =4.3.0 | |
tvOS | =4.4.0 | |
tvOS | =4.4.2 | |
tvOS | =4.4.3 | |
tvOS | =4.4.4 | |
tvOS | =5.0.0 | |
tvOS | =5.0.1 | |
tvOS | =5.0.2 | |
tvOS | =5.1.0 | |
tvOS | =5.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0978 has been rated as a moderate severity vulnerability due to its potential to bypass ASLR protection.
To mitigate CVE-2013-0978, update your iOS device to at least version 6.1.3 or later.
CVE-2013-0978 affects all versions of iOS before 6.1.3 and Apple TV versions before 5.2.1.
Local users with access to the affected devices can exploit CVE-2013-0978 to bypass security mechanisms.
Address Space Layout Randomization (ASLR) is a security feature that CVE-2013-0978 can bypass, potentially allowing unauthorized code execution.