Application Sandbox in Apple iPod touch 2.0 through 2.0.2, and iPhone 2.0 through 2.0.2, does not properly isolate third-party applications, which allows attackers to read arbitrary files in a third-party application's sandbox via a different third-party application.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2008/2525 | vdb entry |
http://www.securitytracker.com/id?1020846 | vdb entry |
http://support.apple.com/kb/HT3026 | |
http://support.apple.com/kb/HT3129 | |
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html | vendor advisory |
http://secunia.com/advisories/31823 | third party advisory |
http://www.vupen.com/english/advisories/2008/2558 | vdb entry |
http://secunia.com/advisories/31900 | third party advisory |
http://www.securityfocus.com/bid/31092 | vdb entry |
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html | vendor advisory |