Apple iPod Touch/iPhone Prior to Version 2.1 Multiple Remote Vulnerabilities

Apple iPod touch and iPhone are prone to multiple remote vulnerabilities:

1. A vulnerability that may allow users to spoof websites.
2. An information-disclosure vulnerability.
3. A remote code-execution vulnerability.

Successfully exploiting these issues may allow attackers to execute arbitrary code, crash the affected application, obtain sensitive information, or direct unsuspecting victims to a spoofed site; other attacks are also possible.

These issues affect versions prior to iPod touch 2.1 and iPhone 2.1.


 

Privacy Statement
Copyright 2010, SecurityFocus