Apple iPhone 2.0.2, in some configurations, allows physically proximate attackers to bypass intended access restrictions, and obtain sensitive information or make arbitrary use of the device, via an Emergency Call tap and a Home double-tap, followed by a tap of any contact's blue arrow.
References
Configurations
Information
Published : 2008-09-02 07:24
Updated : 2008-09-16 22:35
NVD link : CVE-2008-3876
Mitre link : CVE-2008-3876
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
apple
- iphone