Apple iPhone 2.0.2, in some configurations, allows physically proximate attackers to bypass intended access restrictions, and obtain sensitive information or make arbitrary use of the device, via an Emergency Call tap and a Home double-tap, followed by a tap of any contact's blue arrow.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2008-09-02T14:00:00
Updated: 2024-08-07T09:53:00.399Z
Reserved: 2008-09-02T00:00:00
Link: CVE-2008-3876
Vulnrichment
No data.
NVD
Status : Modified
Published: 2008-09-02T14:24:00.000
Modified: 2024-11-21T00:50:19.870
Link: CVE-2008-3876
Redhat
No data.