First published: Thu Sep 19 2013(Updated: )
The Twitter subsystem in Apple iOS before 7 does not require API conformity for access to Twitter daemon interfaces, which allows attackers to post Tweets via a crafted app that sends direct requests to the daemon.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
iPhone OS | <=6.1.4 | |
iPhone OS | =1.0.0 | |
iPhone OS | =1.0.1 | |
iPhone OS | =1.0.2 | |
iPhone OS | =1.1.0 | |
iPhone OS | =1.1.1 | |
iPhone OS | =1.1.2 | |
iPhone OS | =1.1.3 | |
iPhone OS | =1.1.4 | |
iPhone OS | =1.1.5 | |
iPhone OS | =2.0 | |
iPhone OS | =2.0.0 | |
iPhone OS | =2.0.1 | |
iPhone OS | =2.0.2 | |
iPhone OS | =2.1 | |
iPhone OS | =2.1.1 | |
iPhone OS | =2.2 | |
iPhone OS | =2.2.1 | |
iPhone OS | =3.0 | |
iPhone OS | =3.0.1 | |
iPhone OS | =3.1 | |
iPhone OS | =3.1.2 | |
iPhone OS | =3.1.3 | |
iPhone OS | =3.2 | |
iPhone OS | =3.2.1 | |
iPhone OS | =3.2.2 | |
iPhone OS | =4.0 | |
iPhone OS | =4.0.1 | |
iPhone OS | =4.0.2 | |
iPhone OS | =4.1 | |
iPhone OS | =4.2.1 | |
iPhone OS | =4.2.5 | |
iPhone OS | =4.2.8 | |
iPhone OS | =4.3.0 | |
iPhone OS | =4.3.1 | |
iPhone OS | =4.3.2 | |
iPhone OS | =4.3.3 | |
iPhone OS | =4.3.5 | |
iPhone OS | =5.0 | |
iPhone OS | =5.0.1 | |
iPhone OS | =5.1 | |
iPhone OS | =5.1.1 | |
iPhone OS | =6.0 | |
iPhone OS | =6.0.1 | |
iPhone OS | =6.0.2 | |
iPhone OS | =6.1 | |
iPhone OS | =6.1.2 | |
iPhone OS | =6.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5157 has been classified with a high severity as it allows unauthorized posting of Tweets.
To fix CVE-2013-5157, upgrade your iOS device to version 7.0 or later.
CVE-2013-5157 affects various versions of Apple iOS prior to 7.0.
Yes, CVE-2013-5157 can be exploited remotely via specially crafted apps that interact with the Twitter daemon.
iOS versions prior to 7.0, including all versions from 1.0 to 6.1.4, are vulnerable to CVE-2013-5157.