CVE-2008-2307

Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac OS X before 10.5.4, and standalone for Windows and Mac OS X 10.4, allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors involving JavaScript arrays that trigger memory corruption.
References
Link Resource
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2008//Jun/msg00003.html
http://secunia.com/advisories/30775 Vendor Advisory
http://secunia.com/advisories/30801 Vendor Advisory
http://secunia.com/advisories/30992 Vendor Advisory
http://secunia.com/advisories/31074 Vendor Advisory
http://support.apple.com/kb/HT2092
http://support.apple.com/kb/HT2163 Vendor Advisory
http://support.apple.com/kb/HT2165 Vendor Advisory
http://www.kb.cert.org/vuls/id/361043 US Government Resource
http://www.securityfocus.com/bid/29836 Patch
http://www.securitytracker.com/id?1020330
http://www.vupen.com/english/advisories/2008/1882/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1980 Vendor Advisory
http://www.vupen.com/english/advisories/2008/1981/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/2094/references Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00279.html
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00319.html
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2008//Jun/msg00003.html
http://secunia.com/advisories/30775 Vendor Advisory
http://secunia.com/advisories/30801 Vendor Advisory
http://secunia.com/advisories/30992 Vendor Advisory
http://secunia.com/advisories/31074 Vendor Advisory
http://support.apple.com/kb/HT2092
http://support.apple.com/kb/HT2163 Vendor Advisory
http://support.apple.com/kb/HT2165 Vendor Advisory
http://www.kb.cert.org/vuls/id/361043 US Government Resource
http://www.securityfocus.com/bid/29836 Patch
http://www.securitytracker.com/id?1020330
http://www.vupen.com/english/advisories/2008/1882/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/1980 Vendor Advisory
http://www.vupen.com/english/advisories/2008/1981/references Vendor Advisory
http://www.vupen.com/english/advisories/2008/2094/references Vendor Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00279.html
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00319.html
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.8:*:mac_mini:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.8:*:macbook:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.8:*:macbook_pro:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.2:2008-002:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:46

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html - Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2008//Jun/msg00003.html - () http://lists.apple.com/archives/security-announce/2008//Jun/msg00003.html -
References () http://secunia.com/advisories/30775 - Vendor Advisory () http://secunia.com/advisories/30775 - Vendor Advisory
References () http://secunia.com/advisories/30801 - Vendor Advisory () http://secunia.com/advisories/30801 - Vendor Advisory
References () http://secunia.com/advisories/30992 - Vendor Advisory () http://secunia.com/advisories/30992 - Vendor Advisory
References () http://secunia.com/advisories/31074 - Vendor Advisory () http://secunia.com/advisories/31074 - Vendor Advisory
References () http://support.apple.com/kb/HT2092 - () http://support.apple.com/kb/HT2092 -
References () http://support.apple.com/kb/HT2163 - Vendor Advisory () http://support.apple.com/kb/HT2163 - Vendor Advisory
References () http://support.apple.com/kb/HT2165 - Vendor Advisory () http://support.apple.com/kb/HT2165 - Vendor Advisory
References () http://www.kb.cert.org/vuls/id/361043 - US Government Resource () http://www.kb.cert.org/vuls/id/361043 - US Government Resource
References () http://www.securityfocus.com/bid/29836 - Patch () http://www.securityfocus.com/bid/29836 - Patch
References () http://www.securitytracker.com/id?1020330 - () http://www.securitytracker.com/id?1020330 -
References () http://www.vupen.com/english/advisories/2008/1882/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/1882/references - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/1980 - Vendor Advisory () http://www.vupen.com/english/advisories/2008/1980 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/1981/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/1981/references - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/2094/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/2094/references - Vendor Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00279.html - () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00279.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00319.html - () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00319.html -

Information

Published : 2008-06-23 20:41

Updated : 2024-11-21 00:46


NVD link : CVE-2008-2307

Mitre link : CVE-2008-2307

CVE.ORG link : CVE-2008-2307


JSON object : View

Products Affected

apple

  • safari
  • mac_os_x

microsoft

  • windows_vista
  • windows_xp
  • windows
CWE
CWE-399

Resource Management Errors

NVD-CWE-noinfo