The DNAv4 protocol implementation in the DHCP component in Apple iOS before 6 sends Wi-Fi packets containing a MAC address of a host on a previously used network, which might allow remote attackers to obtain sensitive information about previous device locations by sniffing an unencrypted Wi-Fi network for these packets.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html | vendor advisory |
http://support.apple.com/kb/HT5503 | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78720 | vdb entry |