CVE-2009-0945

Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
References
Link Resource
http://code.google.com/p/chromium/issues/detail?id=9019
http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://lists.apple.com/archives/security-announce/2009/May/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00001.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/35056
http://secunia.com/advisories/35074
http://secunia.com/advisories/35095
http://secunia.com/advisories/35576
http://secunia.com/advisories/35805
http://secunia.com/advisories/36062
http://secunia.com/advisories/36461
http://secunia.com/advisories/36790
http://secunia.com/advisories/37746
http://secunia.com/advisories/43068
http://support.apple.com/kb/HT3549 Patch Vendor Advisory
http://support.apple.com/kb/HT3550
http://support.apple.com/kb/HT3639
http://www.debian.org/security/2009/dsa-1950
http://www.redhat.com/support/errata/RHSA-2009-1130.html
http://www.securityfocus.com/archive/1/503594/100/0/threaded
http://www.securityfocus.com/bid/34924
http://www.securitytracker.com/id?1022207
http://www.ubuntu.com/usn/USN-822-1
http://www.ubuntu.com/usn/USN-836-1
http://www.ubuntu.com/usn/USN-857-1
http://www.us-cert.gov/cas/techalerts/TA09-133A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/1298
http://www.vupen.com/english/advisories/2009/1321
http://www.vupen.com/english/advisories/2009/1621
http://www.vupen.com/english/advisories/2011/0212
http://www.zerodayinitiative.com/advisories/ZDI-09-022
https://exchange.xforce.ibmcloud.com/vulnerabilities/50477
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584
https://usn.ubuntu.com/823-1/
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html
http://code.google.com/p/chromium/issues/detail?id=9019
http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://lists.apple.com/archives/security-announce/2009/May/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00001.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/35056
http://secunia.com/advisories/35074
http://secunia.com/advisories/35095
http://secunia.com/advisories/35576
http://secunia.com/advisories/35805
http://secunia.com/advisories/36062
http://secunia.com/advisories/36461
http://secunia.com/advisories/36790
http://secunia.com/advisories/37746
http://secunia.com/advisories/43068
http://support.apple.com/kb/HT3549 Patch Vendor Advisory
http://support.apple.com/kb/HT3550
http://support.apple.com/kb/HT3639
http://www.debian.org/security/2009/dsa-1950
http://www.redhat.com/support/errata/RHSA-2009-1130.html
http://www.securityfocus.com/archive/1/503594/100/0/threaded
http://www.securityfocus.com/bid/34924
http://www.securitytracker.com/id?1022207
http://www.ubuntu.com/usn/USN-822-1
http://www.ubuntu.com/usn/USN-836-1
http://www.ubuntu.com/usn/USN-857-1
http://www.us-cert.gov/cas/techalerts/TA09-133A.html US Government Resource
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/1298
http://www.vupen.com/english/advisories/2009/1321
http://www.vupen.com/english/advisories/2009/1621
http://www.vupen.com/english/advisories/2011/0212
http://www.zerodayinitiative.com/advisories/ZDI-09-022
https://exchange.xforce.ibmcloud.com/vulnerabilities/50477
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584
https://usn.ubuntu.com/823-1/
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*

History

21 Nov 2024, 01:01

Type Values Removed Values Added
References () http://code.google.com/p/chromium/issues/detail?id=9019 - () http://code.google.com/p/chromium/issues/detail?id=9019 -
References () http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html - () http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html -
References () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html -
References () http://lists.apple.com/archives/security-announce/2009/May/msg00000.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/May/msg00000.html - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2009/May/msg00001.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/May/msg00001.html - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/May/msg00002.html - Patch, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://secunia.com/advisories/35056 - () http://secunia.com/advisories/35056 -
References () http://secunia.com/advisories/35074 - () http://secunia.com/advisories/35074 -
References () http://secunia.com/advisories/35095 - () http://secunia.com/advisories/35095 -
References () http://secunia.com/advisories/35576 - () http://secunia.com/advisories/35576 -
References () http://secunia.com/advisories/35805 - () http://secunia.com/advisories/35805 -
References () http://secunia.com/advisories/36062 - () http://secunia.com/advisories/36062 -
References () http://secunia.com/advisories/36461 - () http://secunia.com/advisories/36461 -
References () http://secunia.com/advisories/36790 - () http://secunia.com/advisories/36790 -
References () http://secunia.com/advisories/37746 - () http://secunia.com/advisories/37746 -
References () http://secunia.com/advisories/43068 - () http://secunia.com/advisories/43068 -
References () http://support.apple.com/kb/HT3549 - Patch, Vendor Advisory () http://support.apple.com/kb/HT3549 - Patch, Vendor Advisory
References () http://support.apple.com/kb/HT3550 - () http://support.apple.com/kb/HT3550 -
References () http://support.apple.com/kb/HT3639 - () http://support.apple.com/kb/HT3639 -
References () http://www.debian.org/security/2009/dsa-1950 - () http://www.debian.org/security/2009/dsa-1950 -
References () http://www.redhat.com/support/errata/RHSA-2009-1130.html - () http://www.redhat.com/support/errata/RHSA-2009-1130.html -
References () http://www.securityfocus.com/archive/1/503594/100/0/threaded - () http://www.securityfocus.com/archive/1/503594/100/0/threaded -
References () http://www.securityfocus.com/bid/34924 - () http://www.securityfocus.com/bid/34924 -
References () http://www.securitytracker.com/id?1022207 - () http://www.securitytracker.com/id?1022207 -
References () http://www.ubuntu.com/usn/USN-822-1 - () http://www.ubuntu.com/usn/USN-822-1 -
References () http://www.ubuntu.com/usn/USN-836-1 - () http://www.ubuntu.com/usn/USN-836-1 -
References () http://www.ubuntu.com/usn/USN-857-1 - () http://www.ubuntu.com/usn/USN-857-1 -
References () http://www.us-cert.gov/cas/techalerts/TA09-133A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA09-133A.html - US Government Resource
References () http://www.vupen.com/english/advisories/2009/1297 - () http://www.vupen.com/english/advisories/2009/1297 -
References () http://www.vupen.com/english/advisories/2009/1298 - () http://www.vupen.com/english/advisories/2009/1298 -
References () http://www.vupen.com/english/advisories/2009/1321 - () http://www.vupen.com/english/advisories/2009/1321 -
References () http://www.vupen.com/english/advisories/2009/1621 - () http://www.vupen.com/english/advisories/2009/1621 -
References () http://www.vupen.com/english/advisories/2011/0212 - () http://www.vupen.com/english/advisories/2011/0212 -
References () http://www.zerodayinitiative.com/advisories/ZDI-09-022 - () http://www.zerodayinitiative.com/advisories/ZDI-09-022 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50477 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50477 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584 -
References () https://usn.ubuntu.com/823-1/ - () https://usn.ubuntu.com/823-1/ -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html -

Information

Published : 2009-05-13 17:30

Updated : 2024-11-21 01:01


NVD link : CVE-2009-0945

Mitre link : CVE-2009-0945

CVE.ORG link : CVE-2009-0945


JSON object : View

Products Affected

apple

  • mac_os_x
  • safari
  • mac_os_x_server

microsoft

  • windows_vista
  • windows_xp
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')