Lucene search

K
cve[email protected]CVE-2013-0981
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2013-0981

2022-10-0316:15:03
web.nvd.nist.gov
28
cve-2013-0981
iousbdevicefamily
usb
kernel
apple
ios
apple tv
nvd
security vulnerability

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

5.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

The IOUSBDeviceFamily driver in the USB implementation in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 accesses pipe object pointers that originated in userspace, which allows local users to gain privileges via crafted code.

Affected configurations

NVD
Node
appleiphone_osRange≀6.1.2
OR
appleiphone_osMatch1.0.0
OR
appleiphone_osMatch1.0.1
OR
appleiphone_osMatch1.0.2
OR
appleiphone_osMatch1.1.0
OR
appleiphone_osMatch1.1.0-ipodtouch
OR
appleiphone_osMatch1.1.1
OR
appleiphone_osMatch1.1.2
OR
appleiphone_osMatch1.1.2-ipodtouch
OR
appleiphone_osMatch1.1.3
OR
appleiphone_osMatch1.1.3-ipodtouch
OR
appleiphone_osMatch1.1.4
OR
appleiphone_osMatch1.1.4-ipodtouch
OR
appleiphone_osMatch1.1.5
OR
appleiphone_osMatch1.1.5-ipodtouch
OR
appleiphone_osMatch2.0
OR
appleiphone_osMatch2.0.0
OR
appleiphone_osMatch2.0.0-ipodtouch
OR
appleiphone_osMatch2.0.1
OR
appleiphone_osMatch2.0.1-ipodtouch
OR
appleiphone_osMatch2.0.2
OR
appleiphone_osMatch2.0.2-ipodtouch
OR
appleiphone_osMatch2.1
OR
appleiphone_osMatch2.1-ipodtouch
OR
appleiphone_osMatch2.1.1
OR
appleiphone_osMatch2.2
OR
appleiphone_osMatch2.2-ipodtouch
OR
appleiphone_osMatch2.2.1
OR
appleiphone_osMatch2.2.1-ipodtouch
OR
appleiphone_osMatch3.0
OR
appleiphone_osMatch3.0-ipodtouch
OR
appleiphone_osMatch3.0.1
OR
appleiphone_osMatch3.0.1-ipodtouch
OR
appleiphone_osMatch3.1
OR
appleiphone_osMatch3.1-ipodtouch
OR
appleiphone_osMatch3.1.2
OR
appleiphone_osMatch3.1.2-ipodtouch
OR
appleiphone_osMatch3.1.3
OR
appleiphone_osMatch3.1.3-ipodtouch
OR
appleiphone_osMatch3.2
OR
appleiphone_osMatch3.2-ipodtouch
OR
appleiphone_osMatch3.2.1
OR
appleiphone_osMatch3.2.1-ipad
OR
appleiphone_osMatch3.2.2
OR
appleiphone_osMatch4.0
OR
appleiphone_osMatch4.0-ipodtouch
OR
appleiphone_osMatch4.0.1
OR
appleiphone_osMatch4.0.1-ipodtouch
OR
appleiphone_osMatch4.0.2
OR
appleiphone_osMatch4.1
OR
appleiphone_osMatch4.2.1
OR
appleiphone_osMatch4.2.5
OR
appleiphone_osMatch4.2.8
OR
appleiphone_osMatch4.3.0
OR
appleiphone_osMatch4.3.1
OR
appleiphone_osMatch4.3.2
OR
appleiphone_osMatch4.3.3
OR
appleiphone_osMatch4.3.5
OR
appleiphone_osMatch4.3.5-ipad
OR
appleiphone_osMatch4.3.5-ipodtouch
OR
appleiphone_osMatch5.0
OR
appleiphone_osMatch5.0-ipad
OR
appleiphone_osMatch5.0-ipodtouch
OR
appleiphone_osMatch5.0.1
OR
appleiphone_osMatch5.0.1-ipad
OR
appleiphone_osMatch5.0.1-ipodtouch
OR
appleiphone_osMatch5.1
OR
appleiphone_osMatch5.1.1
OR
appleiphone_osMatch6.0
OR
appleiphone_osMatch6.0.1
OR
appleiphone_osMatch6.0.2
OR
appleiphone_osMatch6.1
Node
appletvosRange≀5.2.0
OR
appletvosMatch1.0.0
OR
appletvosMatch1.1.0
OR
appletvosMatch2.0.0
OR
appletvosMatch2.0.1
OR
appletvosMatch2.0.2
OR
appletvosMatch2.1.0
OR
appletvosMatch2.2.0
OR
appletvosMatch2.3.0
OR
appletvosMatch2.3.1
OR
appletvosMatch2.4.0
OR
appletvosMatch3.0.0
OR
appletvosMatch3.0.1
OR
appletvosMatch3.0.2
OR
appletvosMatch4.1.0
OR
appletvosMatch4.1.1
OR
appletvosMatch4.2.0
OR
appletvosMatch4.2.1
OR
appletvosMatch4.2.2
OR
appletvosMatch4.3.0
OR
appletvosMatch4.4.0
OR
appletvosMatch4.4.2
OR
appletvosMatch4.4.3
OR
appletvosMatch4.4.4
OR
appletvosMatch5.0.0
OR
appletvosMatch5.0.1
OR
appletvosMatch5.0.2
OR
appletvosMatch5.1.0
OR
appletvosMatch5.1.1

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

5.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%