CVE-2009-0153

International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
References
Link Resource
http://bugs.icu-project.org/trac/ticket/5691
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://secunia.com/advisories/35074
http://secunia.com/advisories/35379
http://secunia.com/advisories/35436
http://secunia.com/advisories/35498
http://secunia.com/advisories/35584
http://support.apple.com/kb/HT3549 Patch Vendor Advisory
http://support.apple.com/kb/HT3613
http://support.apple.com/kb/HT3639
http://www.redhat.com/support/errata/RHSA-2009-1122.html
http://www.securityfocus.com/bid/34926
http://www.securityfocus.com/bid/34974
http://www.us-cert.gov/cas/techalerts/TA09-133A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/1522
http://www.vupen.com/english/advisories/2009/1621
https://bugzilla.redhat.com/show_bug.cgi?id=503071
https://exchange.xforce.ibmcloud.com/vulnerabilities/50488
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html
http://bugs.icu-project.org/trac/ticket/5691
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://secunia.com/advisories/35074
http://secunia.com/advisories/35379
http://secunia.com/advisories/35436
http://secunia.com/advisories/35498
http://secunia.com/advisories/35584
http://support.apple.com/kb/HT3549 Patch Vendor Advisory
http://support.apple.com/kb/HT3613
http://support.apple.com/kb/HT3639
http://www.redhat.com/support/errata/RHSA-2009-1122.html
http://www.securityfocus.com/bid/34926
http://www.securityfocus.com/bid/34974
http://www.us-cert.gov/cas/techalerts/TA09-133A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/1522
http://www.vupen.com/english/advisories/2009/1621
https://bugzilla.redhat.com/show_bug.cgi?id=503071
https://exchange.xforce.ibmcloud.com/vulnerabilities/50488
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://bugs.icu-project.org/trac/ticket/5691 - () http://bugs.icu-project.org/trac/ticket/5691 -
References () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html -
References () http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - () http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html -
References () http://secunia.com/advisories/35074 - () http://secunia.com/advisories/35074 -
References () http://secunia.com/advisories/35379 - () http://secunia.com/advisories/35379 -
References () http://secunia.com/advisories/35436 - () http://secunia.com/advisories/35436 -
References () http://secunia.com/advisories/35498 - () http://secunia.com/advisories/35498 -
References () http://secunia.com/advisories/35584 - () http://secunia.com/advisories/35584 -
References () http://support.apple.com/kb/HT3549 - Patch, Vendor Advisory () http://support.apple.com/kb/HT3549 - Patch, Vendor Advisory
References () http://support.apple.com/kb/HT3613 - () http://support.apple.com/kb/HT3613 -
References () http://support.apple.com/kb/HT3639 - () http://support.apple.com/kb/HT3639 -
References () http://www.redhat.com/support/errata/RHSA-2009-1122.html - () http://www.redhat.com/support/errata/RHSA-2009-1122.html -
References () http://www.securityfocus.com/bid/34926 - () http://www.securityfocus.com/bid/34926 -
References () http://www.securityfocus.com/bid/34974 - () http://www.securityfocus.com/bid/34974 -
References () http://www.us-cert.gov/cas/techalerts/TA09-133A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-133A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2009/1297 - () http://www.vupen.com/english/advisories/2009/1297 -
References () http://www.vupen.com/english/advisories/2009/1522 - () http://www.vupen.com/english/advisories/2009/1522 -
References () http://www.vupen.com/english/advisories/2009/1621 - () http://www.vupen.com/english/advisories/2009/1621 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=503071 - () https://bugzilla.redhat.com/show_bug.cgi?id=503071 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50488 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50488 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11366 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html - () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00336.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html - () https://www.redhat.com/archives/fedora-package-announce/2009-June/msg00478.html -

Information

Published : 2009-05-13 15:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0153

Mitre link : CVE-2009-0153

CVE.ORG link : CVE-2009-0153


JSON object : View

Products Affected

apple

  • mac_os_x
  • mac_os_x_server
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')