Apple iPhone 2.0.2, in some configurations, allows physically proximate attackers to bypass intended access restrictions, and obtain sensitive information or make arbitrary use of the device, via an Emergency Call tap and a Home double-tap, followed by a tap of any contact's blue arrow.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2008-09-02T14:00:00
Updated: 2008-09-17T09:00:00
Reserved: 2008-09-02T00:00:00
Link: CVE-2008-3876
JSON object: View
NVD Information
Status : Modified
Published: 2008-09-02T14:24:00.000
Modified: 2008-09-17T05:35:28.040
Link: CVE-2008-3876
JSON object: View
Redhat Information
No data.
CWE