Vulnerability Name: | CVE-2009-1707 (CCN-51226) |
Assigned: | 2009-06-08 |
Published: | 2009-06-08 |
Updated: | 2010-12-10 |
Summary: | Race condition in the Reset Safari implementation in Apple Safari before 4.0 on Windows might allow local users to read stored web-site passwords via unspecified vectors.
|
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 1.2 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N) 0.9 Low (Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): High Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N) 1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-362
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2009-1707
Source: APPLE Type: Patch, Vendor Advisory APPLE-SA-2009-06-08-1
Source: APPLE Type: UNKNOWN APPLE-SA-2010-11-22-1
Source: OSVDB Type: UNKNOWN 55012
Source: CCN Type: SA35379 Apple Safari Multiple Vulnerabilities
Source: SECUNIA Type: Vendor Advisory 35379
Source: CCN Type: SA42314 Apple iOS Multiple Vulnerabilities
Source: SECUNIA Type: UNKNOWN 42314
Source: CCN Type: Apple Web site About the security content of Safari 4.0
Source: CONFIRM Type: Patch, Vendor Advisory http://support.apple.com/kb/HT3613
Source: CONFIRM Type: UNKNOWN http://support.apple.com/kb/HT4456
Source: CCN Type: OSVDB ID: 55012 Apple Safari on Windows Reset Safari Implementation Stored Web Password Persistence
Source: BID Type: Exploit 35260
Source: CCN Type: BID-35260 RETIRED: Apple Safari Prior to 4.0 Multiple Security Vulnerabilities
Source: CCN Type: BID-35346 Apple Safari for Windows Private Browsing Cookie Data Local Information Disclosure Vulnerability
Source: BID Type: UNKNOWN 35352
Source: CCN Type: BID-35352 Apple Safari for Windows Reset Password Information Disclosure Vulnerability
Source: VUPEN Type: Patch, Vendor Advisory ADV-2009-1522
Source: VUPEN Type: UNKNOWN ADV-2010-3046
Source: XF Type: UNKNOWN safari-reset-information-disclosure(51226)
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apple:safari:3.0:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.0.1:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.0.2:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.0.3:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.0.4:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.1:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.1.1:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.1.2:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.2:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.2.1:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:3.2.2:*:windows:*:*:*:*:*OR cpe:/a:apple:safari:*:*:windows:*:*:*:*:* (Version <= 3.2.3) Configuration CCN 1: cpe:/a:apple:safari:3.0.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.3:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.0.4:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.1.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.2:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.2.1:*:*:*:*:*:*:*OR cpe:/a:apple:safari:3.2.2:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0.0:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0.1:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0.2:-:ipodtouch:*:*:*:*:*OR cpe:/a:apple:safari:3.2.3:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.0:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.0:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.0:*:*:*:*:*:*:*OR cpe:/o:apple:ios:4.0.1:*:*:*:*:*:*:*OR cpe:/o:apple:iphone_os:2.1:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.0:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.1.2:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:iphone_os:3.1:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:ios:4.0.1:-:ipodtouch:*:*:*:*:*OR cpe:/o:apple:ios:4.0:-:ipodtouch:*:*:*:*:*AND cpe:/h:apple:ipad:*:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |