CVE-2009-1698

WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
References
Link Resource
http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://osvdb.org/55006
http://secunia.com/advisories/35379 Vendor Advisory
http://secunia.com/advisories/35588
http://secunia.com/advisories/36057
http://secunia.com/advisories/36062
http://secunia.com/advisories/36790
http://secunia.com/advisories/37746
http://secunia.com/advisories/43068
http://securitytracker.com/id?1022345 Patch
http://support.apple.com/kb/HT3613 Patch Vendor Advisory
http://support.apple.com/kb/HT3639
http://www.debian.org/security/2009/dsa-1950
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330
http://www.redhat.com/support/errata/RHSA-2009-1128.html
http://www.securityfocus.com/archive/1/504173/100/0/threaded
http://www.securityfocus.com/archive/1/504295/100/0/threaded
http://www.securityfocus.com/bid/35260 Exploit
http://www.securityfocus.com/bid/35318
http://www.ubuntu.com/usn/USN-822-1
http://www.ubuntu.com/usn/USN-836-1
http://www.ubuntu.com/usn/USN-857-1
http://www.vupen.com/english/advisories/2009/1522 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1621
http://www.vupen.com/english/advisories/2011/0212
http://www.zerodayinitiative.com/advisories/ZDI-09-032/ Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9484
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html
http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://osvdb.org/55006
http://secunia.com/advisories/35379 Vendor Advisory
http://secunia.com/advisories/35588
http://secunia.com/advisories/36057
http://secunia.com/advisories/36062
http://secunia.com/advisories/36790
http://secunia.com/advisories/37746
http://secunia.com/advisories/43068
http://securitytracker.com/id?1022345 Patch
http://support.apple.com/kb/HT3613 Patch Vendor Advisory
http://support.apple.com/kb/HT3639
http://www.debian.org/security/2009/dsa-1950
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330
http://www.redhat.com/support/errata/RHSA-2009-1128.html
http://www.securityfocus.com/archive/1/504173/100/0/threaded
http://www.securityfocus.com/archive/1/504295/100/0/threaded
http://www.securityfocus.com/bid/35260 Exploit
http://www.securityfocus.com/bid/35318
http://www.ubuntu.com/usn/USN-822-1
http://www.ubuntu.com/usn/USN-836-1
http://www.ubuntu.com/usn/USN-857-1
http://www.vupen.com/english/advisories/2009/1522 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1621
http://www.vupen.com/english/advisories/2011/0212
http://www.zerodayinitiative.com/advisories/ZDI-09-032/ Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9484
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html - () http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html -
References () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html -
References () http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Patch, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://osvdb.org/55006 - () http://osvdb.org/55006 -
References () http://secunia.com/advisories/35379 - Vendor Advisory () http://secunia.com/advisories/35379 - Vendor Advisory
References () http://secunia.com/advisories/35588 - () http://secunia.com/advisories/35588 -
References () http://secunia.com/advisories/36057 - () http://secunia.com/advisories/36057 -
References () http://secunia.com/advisories/36062 - () http://secunia.com/advisories/36062 -
References () http://secunia.com/advisories/36790 - () http://secunia.com/advisories/36790 -
References () http://secunia.com/advisories/37746 - () http://secunia.com/advisories/37746 -
References () http://secunia.com/advisories/43068 - () http://secunia.com/advisories/43068 -
References () http://securitytracker.com/id?1022345 - Patch () http://securitytracker.com/id?1022345 - Patch
References () http://support.apple.com/kb/HT3613 - Patch, Vendor Advisory () http://support.apple.com/kb/HT3613 - Patch, Vendor Advisory
References () http://support.apple.com/kb/HT3639 - () http://support.apple.com/kb/HT3639 -
References () http://www.debian.org/security/2009/dsa-1950 - () http://www.debian.org/security/2009/dsa-1950 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:330 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:330 -
References () http://www.redhat.com/support/errata/RHSA-2009-1128.html - () http://www.redhat.com/support/errata/RHSA-2009-1128.html -
References () http://www.securityfocus.com/archive/1/504173/100/0/threaded - () http://www.securityfocus.com/archive/1/504173/100/0/threaded -
References () http://www.securityfocus.com/archive/1/504295/100/0/threaded - () http://www.securityfocus.com/archive/1/504295/100/0/threaded -
References () http://www.securityfocus.com/bid/35260 - Exploit () http://www.securityfocus.com/bid/35260 - Exploit
References () http://www.securityfocus.com/bid/35318 - () http://www.securityfocus.com/bid/35318 -
References () http://www.ubuntu.com/usn/USN-822-1 - () http://www.ubuntu.com/usn/USN-822-1 -
References () http://www.ubuntu.com/usn/USN-836-1 - () http://www.ubuntu.com/usn/USN-836-1 -
References () http://www.ubuntu.com/usn/USN-857-1 - () http://www.ubuntu.com/usn/USN-857-1 -
References () http://www.vupen.com/english/advisories/2009/1522 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1522 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/1621 - () http://www.vupen.com/english/advisories/2009/1621 -
References () http://www.vupen.com/english/advisories/2011/0212 - () http://www.vupen.com/english/advisories/2011/0212 -
References () http://www.zerodayinitiative.com/advisories/ZDI-09-032/ - Patch () http://www.zerodayinitiative.com/advisories/ZDI-09-032/ - Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9484 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9484 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html -

Information

Published : 2009-06-10 18:00

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1698

Mitre link : CVE-2009-1698

CVE.ORG link : CVE-2009-1698


JSON object : View

Products Affected

apple

  • iphone_os
  • safari
  • ipod_touch
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')