Vulnerability Name: | CVE-2013-5198 (CCN-89787) | ||||||||||||||||||||
Assigned: | 2013-12-16 | ||||||||||||||||||||
Published: | 2013-12-16 | ||||||||||||||||||||
Updated: | 2019-03-08 | ||||||||||||||||||||
Summary: | WebKit, as used in Apple Safari before 6.1.1 and 7.x before 7.0.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-12-16-1. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P) 5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: APPLE Type: Broken Link APPLE-SA-2013-12-16-2 Source: APPLE Type: Broken Link APPLE-SA-2013-12-16-1 Source: MITRE Type: CNA CVE-2013-5198 Source: CCN Type: SA56122 Apple Safari Multiple Vulnerabilities Source: CCN Type: SA56144 Apple OS X Multiple Vulnerabilities Source: CCN Type: Apple Web site About the security content of Safari 6.1.1 and Safari 7.0.1 Source: CONFIRM Type: Vendor Advisory http://support.apple.com/kb/HT6162 Source: CONFIRM Type: Vendor Advisory http://support.apple.com/kb/HT6163 Source: CCN Type: IBM Security Bulletin 1972479 Multiple Vulnerabilities in Apple WebKit affect current releases of Informix Genero Source: CCN Type: OSVDB ID: 101093 WebKit Unspecified Memory Corruption (2013-5198) Source: CCN Type: BID-64359 WebKit CVE-2013-5198 Unspecified Memory Corruption Vulnerability Source: XF Type: UNKNOWN apple-cve20135198-code-exec(89787) Source: CONFIRM Type: Vendor Advisory https://support.apple.com/kb/HT6537 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |