Vulnerability Description
Networking in Apple iOS before 4.2 accesses an invalid pointer during the processing of packet filter rules, which allows local users to gain privileges via unspecified vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Iphone Os | <= 4.1 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.htmlVendor Advisory
- http://secunia.com/advisories/42314
- http://support.apple.com/kb/HT4456Vendor Advisory
- http://www.securitytracker.com/id?1024772
- http://www.vupen.com/english/advisories/2010/3046
- https://exchange.xforce.ibmcloud.com/vulnerabilities/63419
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.htmlVendor Advisory
- http://secunia.com/advisories/42314
- http://support.apple.com/kb/HT4456Vendor Advisory
- http://www.securitytracker.com/id?1024772
- http://www.vupen.com/english/advisories/2010/3046
- https://exchange.xforce.ibmcloud.com/vulnerabilities/63419
FAQ
What is CVE-2010-3830?
CVE-2010-3830 is a vulnerability with a CVSS score of 7.2 (HIGH). Networking in Apple iOS before 4.2 accesses an invalid pointer during the processing of packet filter rules, which allows local users to gain privileges via unspecified vectors.
How severe is CVE-2010-3830?
CVE-2010-3830 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-3830?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Iphone Os.