First published: Wed Mar 20 2013(Updated: )
lockdownd in Lockdown in Apple iOS before 6.1.3 does not properly consider file types during the permission-setting step of a backup restoration, which allows local users to change the permissions of arbitrary files via a backup that contains a pathname with a symlink.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <=6.1.2 | |
Apple iPhone OS | =1.0.0 | |
Apple iPhone OS | =1.0.1 | |
Apple iPhone OS | =1.0.2 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.1 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =2.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1.1 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2.1 | |
Apple iPhone OS | =2.2.1 | |
Apple iPhone OS | =3.0 | |
Apple iPhone OS | =3.0 | |
Apple iPhone OS | =3.0.1 | |
Apple iPhone OS | =3.0.1 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =3.1.2 | |
Apple iPhone OS | =3.1.2 | |
Apple iPhone OS | =3.1.3 | |
Apple iPhone OS | =3.1.3 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.2.2 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.0.2 | |
Apple iPhone OS | =4.1 | |
Apple iPhone OS | =4.2.1 | |
Apple iPhone OS | =4.2.5 | |
Apple iPhone OS | =4.2.8 | |
Apple iPhone OS | =4.3.0 | |
Apple iPhone OS | =4.3.1 | |
Apple iPhone OS | =4.3.2 | |
Apple iPhone OS | =4.3.3 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.0.1 | |
Apple iPhone OS | =5.1 | |
Apple iPhone OS | =5.1.1 | |
Apple iPhone OS | =6.0 | |
Apple iPhone OS | =6.0.1 | |
Apple iPhone OS | =6.0.2 | |
Apple iPhone OS | =6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0979 is classified as a medium severity vulnerability due to potential unauthorized access to file permissions.
To fix CVE-2013-0979, update your iOS device to version 6.1.3 or later as it contains the necessary security patch.
CVE-2013-0979 affects Apple iOS versions prior to 6.1.3, including early versions like 1.0.0 up to 6.1.2.
Yes, CVE-2013-0979 can be exploited by local users through the manipulation of backup files containing symlinks.
The risks include allowing local users to change file permissions, which could lead to unauthorized access or data compromise.