The Telephony subsystem in Apple iOS before 7 does not require API conformity for access to telephony-daemon interfaces, which allows attackers to bypass intended restrictions on phone calls via a crafted app that sends direct requests to the daemon.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1029054 | vdb entry |
http://secunia.com/advisories/54886 | third party advisory vendor advisory |
http://support.apple.com/kb/HT5934 | vendor advisory |
http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html | vendor advisory |