Vulnerability Name: | CVE-2009-1701 (CCN-51255) |
Assigned: | 2009-06-08 |
Published: | 2009-06-08 |
Updated: | 2022-08-09 |
Summary: | Use-after-free vulnerability in the JavaScript DOM implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by destroying a document.body element that has an unspecified XML container with elements that support the dir attribute.
|
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-399
|
Vulnerability Consequences: | Gain Access |
References: | Source: MITRE Type: CNA CVE-2009-1701
Source: APPLE Type: Patch, Vendor Advisory APPLE-SA-2009-06-08-1
Source: APPLE Type: UNKNOWN APPLE-SA-2009-06-17-1
Source: SUSE Type: UNKNOWN SUSE-SR:2011:002
Source: OSVDB Type: UNKNOWN 55008
Source: CCN Type: SA35379 Apple Safari Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 35379
Source: SECUNIA Type: UNKNOWN 43068
Source: CCN Type: SECTRACK ID: 1022345 Apple Safari Bugs Let Remote Users Execute Arbitrary Code
Source: SECTRACK Type: Patch 1022345
Source: CCN Type: Apple Web site About the security content of Safari 4.0
Source: CONFIRM Type: Patch, Vendor Advisory http://support.apple.com/kb/HT3613
Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT3639
Source: CCN Type: OSVDB ID: 55008 Apple Safari WebKit JavaScript dir Attribute DOM Handling Use-after-free Arbitrary Code Execution
Source: BUGTRAQ Type: UNKNOWN 20090608 ZDI-09-033: Apple WebKit dir Attribute Freeing Dangling Object Pointer Vulnerability
Source: BID Type: Exploit 35260
Source: CCN Type: BID-35260 RETIRED: Apple Safari Prior to 4.0 Multiple Security Vulnerabilities
Source: BID Type: UNKNOWN 35325
Source: CCN Type: BID-35325 WebKit JavaScript DOM User After Free Remote Code Execution Vulnerability
Source: VUPEN Type: Patch, Vendor Advisory ADV-2009-1522
Source: VUPEN Type: UNKNOWN ADV-2009-1621
Source: VUPEN Type: UNKNOWN ADV-2011-0212
Source: MISC Type: Patch http://www.zerodayinitiative.com/advisories/ZDI-09-033/
Source: XF Type: UNKNOWN safari-javascriptdom-code-execution(51255)
Source: SUSE Type: SUSE-SR:2011:002 SUSE Security Summary Report
Source: CCN Type: ZDI-09-033 Apple WebKit dir Attribute Freeing Dangling Object Pointer Vulnerability
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apple:safari:3.0.4b:*:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.4:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.1:beta:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0.3:*:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0.3:417.8:*:*:*:*:*:*OR cpe:/a:apple:safari:3.2.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.3:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.2b:*:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0.4:*:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.3b:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.0b:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1.0b:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.1b:*:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0.3:417.9:*:*:*:*:*:*OR cpe:/a:apple:safari:*:*:*:*:*:*:*:* (Version <= 3.2.2)OR cpe:/a:apple:safari:3.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.2.1:*:*:*:*:*:*:* Configuration 2: cpe:/o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.2:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*AND cpe:/h:apple:ipod_touch:*:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:apple:safari:2.0.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.3:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:1.3.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:1.3:*:*:*:*:*:*:*OR cpe:/a:apple:safari:1.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:1.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:1.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:2.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.4:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.2.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.2.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:1.0.3:*:*:*:*:*:*:*OR cpe:/a:apple:safari:1.3.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:0.8:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.2.3:*:*:*:*:*:*:*OR cpe:/a:apple:safari:4.0:beta:*:*:*:*:*:*OR cpe:/a:apple:safari:0.9:*:*:*:*:*:*:*AND cpe:/o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*OR cpe:/o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |