2.1

CVE-2013-0978

The ARM prefetch abort handler in the kernel in Apple iOS before 6.1.3 and Apple TV before 5.2.1 does not ensure that it has been invoked in an abort context, which makes it easier for local users to bypass the ASLR protection mechanism via crafted code.

Data is provided by the National Vulnerability Database (NVD)
AppleiPhone OS Version <= 6.1.2
AppleiPhone OS Version1.0.0
AppleiPhone OS Version1.0.1
AppleiPhone OS Version1.0.2
AppleiPhone OS Version1.1.0
AppleiPhone OS Version1.1.0 Update- Editionipodtouch
AppleiPhone OS Version1.1.1
AppleiPhone OS Version1.1.2
AppleiPhone OS Version1.1.2 Update- Editionipodtouch
AppleiPhone OS Version1.1.3
AppleiPhone OS Version1.1.3 Update- Editionipodtouch
AppleiPhone OS Version1.1.4
AppleiPhone OS Version1.1.4 Update- Editionipodtouch
AppleiPhone OS Version1.1.5
AppleiPhone OS Version1.1.5 Update- Editionipodtouch
AppleiPhone OS Version2.0
AppleiPhone OS Version2.0.0
AppleiPhone OS Version2.0.0 Update- Editionipodtouch
AppleiPhone OS Version2.0.1
AppleiPhone OS Version2.0.1 Update- Editionipodtouch
AppleiPhone OS Version2.0.2
AppleiPhone OS Version2.0.2 Update- Editionipodtouch
AppleiPhone OS Version2.1
AppleiPhone OS Version2.1 Update- Editionipodtouch
AppleiPhone OS Version2.1.1
AppleiPhone OS Version2.2
AppleiPhone OS Version2.2 Update- Editionipodtouch
AppleiPhone OS Version2.2.1
AppleiPhone OS Version2.2.1 Update- Editionipodtouch
AppleiPhone OS Version3.0
AppleiPhone OS Version3.0 Update- Editionipodtouch
AppleiPhone OS Version3.0.1
AppleiPhone OS Version3.0.1 Update- Editionipodtouch
AppleiPhone OS Version3.1
AppleiPhone OS Version3.1 Update- Editionipodtouch
AppleiPhone OS Version3.1.2
AppleiPhone OS Version3.1.2 Update- Editionipodtouch
AppleiPhone OS Version3.1.3
AppleiPhone OS Version3.1.3 Update- Editionipodtouch
AppleiPhone OS Version3.2
AppleiPhone OS Version3.2 Update- Editionipodtouch
AppleiPhone OS Version3.2.1
AppleiPhone OS Version3.2.1 Update- Editionipad
AppleiPhone OS Version3.2.2
AppleiPhone OS Version4.0
AppleiPhone OS Version4.0 Update- Editionipodtouch
AppleiPhone OS Version4.0.1
AppleiPhone OS Version4.0.1 Update- Editionipodtouch
AppleiPhone OS Version4.0.2
AppleiPhone OS Version4.1
AppleiPhone OS Version4.2.1
AppleiPhone OS Version4.2.5
AppleiPhone OS Version4.2.8
AppleiPhone OS Version4.3.0
AppleiPhone OS Version4.3.1
AppleiPhone OS Version4.3.2
AppleiPhone OS Version4.3.3
AppleiPhone OS Version4.3.5
AppleiPhone OS Version4.3.5 Update- Editionipad
AppleiPhone OS Version4.3.5 Update- Editionipodtouch
AppleiPhone OS Version5.0
AppleiPhone OS Version5.0 Update- Editionipad
AppleiPhone OS Version5.0 Update- Editionipodtouch
AppleiPhone OS Version5.0.1
AppleiPhone OS Version5.0.1 Update- Editionipad
AppleiPhone OS Version5.0.1 Update- Editionipodtouch
AppleiPhone OS Version5.1
AppleiPhone OS Version5.1.1
AppleiPhone OS Version6.0
AppleiPhone OS Version6.0.1
AppleiPhone OS Version6.0.2
AppleiPhone OS Version6.1
AppletvOS Version <= 5.2.0
AppletvOS Version1.0.0
AppletvOS Version1.1.0
AppletvOS Version2.0.0
AppletvOS Version2.0.1
AppletvOS Version2.0.2
AppletvOS Version2.1.0
AppletvOS Version2.2.0
AppletvOS Version2.3.0
AppletvOS Version2.3.1
AppletvOS Version2.4.0
AppletvOS Version3.0.0
AppletvOS Version3.0.1
AppletvOS Version3.0.2
AppletvOS Version4.1.0
AppletvOS Version4.1.1
AppletvOS Version4.2.0
AppletvOS Version4.2.1
AppletvOS Version4.2.2
AppletvOS Version4.3.0
AppletvOS Version4.4.0
AppletvOS Version4.4.2
AppletvOS Version4.4.3
AppletvOS Version4.4.4
AppletvOS Version5.0.0
AppletvOS Version5.0.1
AppletvOS Version5.0.2
AppletvOS Version5.1.0
AppletvOS Version5.1.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.06% 0.192
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.