Apple iPhone 2.0.2, in some configurations, allows physically proximate attackers to bypass intended access restrictions, and obtain sensitive information or make arbitrary use of the device, via an Emergency Call tap and a Home double-tap, followed by a tap of any contact's blue arrow.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2008-09-02T14:00:00

Updated: 2024-08-07T09:53:00.399Z

Reserved: 2008-09-02T00:00:00

Link: CVE-2008-3876

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2008-09-02T14:24:00.000

Modified: 2008-09-17T05:35:28.040

Link: CVE-2008-3876

cve-icon Redhat

No data.