CVE-2009-1699

The XSL stylesheet implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle XML external entities, which allows remote attackers to read arbitrary files via a crafted DTD, as demonstrated by a file:///etc/passwd URL in an entity declaration, related to an "XXE attack."
References
Link Resource
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html Mailing List
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html Broken Link Mailing List Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html Mailing List
http://osvdb.org/54972 Broken Link
http://scary.beasts.org/security/CESA-2009-006.html Exploit
http://scarybeastsecurity.blogspot.com/2009/06/apples-safari-4-fixes-local-file-theft.html Exploit
http://secunia.com/advisories/35379 Broken Link Vendor Advisory
http://secunia.com/advisories/43068 Broken Link
http://support.apple.com/kb/HT3613 Patch Vendor Advisory
http://support.apple.com/kb/HT3639 Vendor Advisory
http://www.securityfocus.com/bid/35260 Broken Link Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35321 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-857-1 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1522 Broken Link Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1621 Broken Link
http://www.vupen.com/english/advisories/2011/0212 Broken Link
https://www.exploit-db.com/exploits/8907 Exploit Third Party Advisory VDB Entry
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html Mailing List
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html Broken Link Mailing List Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html Mailing List
http://osvdb.org/54972 Broken Link
http://scary.beasts.org/security/CESA-2009-006.html Exploit
http://scarybeastsecurity.blogspot.com/2009/06/apples-safari-4-fixes-local-file-theft.html Exploit
http://secunia.com/advisories/35379 Broken Link Vendor Advisory
http://secunia.com/advisories/43068 Broken Link
http://support.apple.com/kb/HT3613 Patch Vendor Advisory
http://support.apple.com/kb/HT3639 Vendor Advisory
http://www.securityfocus.com/bid/35260 Broken Link Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/35321 Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-857-1 Third Party Advisory
http://www.vupen.com/english/advisories/2009/1522 Broken Link Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1621 Broken Link
http://www.vupen.com/english/advisories/2011/0212 Broken Link
https://www.exploit-db.com/exploits/8907 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - Mailing List () http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - Mailing List
References () http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Broken Link, Mailing List, Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Broken Link, Mailing List, Patch, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - Mailing List () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - Mailing List
References () http://osvdb.org/54972 - Broken Link () http://osvdb.org/54972 - Broken Link
References () http://scary.beasts.org/security/CESA-2009-006.html - Exploit () http://scary.beasts.org/security/CESA-2009-006.html - Exploit
References () http://scarybeastsecurity.blogspot.com/2009/06/apples-safari-4-fixes-local-file-theft.html - Exploit () http://scarybeastsecurity.blogspot.com/2009/06/apples-safari-4-fixes-local-file-theft.html - Exploit
References () http://secunia.com/advisories/35379 - Broken Link, Vendor Advisory () http://secunia.com/advisories/35379 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/43068 - Broken Link () http://secunia.com/advisories/43068 - Broken Link
References () http://support.apple.com/kb/HT3613 - Patch, Vendor Advisory () http://support.apple.com/kb/HT3613 - Patch, Vendor Advisory
References () http://support.apple.com/kb/HT3639 - Vendor Advisory () http://support.apple.com/kb/HT3639 - Vendor Advisory
References () http://www.securityfocus.com/bid/35260 - Broken Link, Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/35260 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/35321 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/35321 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-857-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-857-1 - Third Party Advisory
References () http://www.vupen.com/english/advisories/2009/1522 - Broken Link, Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/1522 - Broken Link, Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/1621 - Broken Link () http://www.vupen.com/english/advisories/2009/1621 - Broken Link
References () http://www.vupen.com/english/advisories/2011/0212 - Broken Link () http://www.vupen.com/english/advisories/2011/0212 - Broken Link
References () https://www.exploit-db.com/exploits/8907 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/8907 - Exploit, Third Party Advisory, VDB Entry

10 Feb 2024, 02:48

Type Values Removed Values Added
CWE CWE-200 CWE-611
First Time Opensuse
Canonical
Canonical ubuntu Linux
Opensuse opensuse
CPE cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*
References (OSVDB) http://osvdb.org/54972 - (OSVDB) http://osvdb.org/54972 - Broken Link
References (APPLE) http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - (APPLE) http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html - Mailing List
References (BID) http://www.securityfocus.com/bid/35260 - Exploit (BID) http://www.securityfocus.com/bid/35260 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References (SECUNIA) http://secunia.com/advisories/43068 - (SECUNIA) http://secunia.com/advisories/43068 - Broken Link
References (SECUNIA) http://secunia.com/advisories/35379 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/35379 - Broken Link, Vendor Advisory
References (APPLE) http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Patch, Vendor Advisory (APPLE) http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html - Broken Link, Mailing List, Patch, Vendor Advisory
References (CONFIRM) http://support.apple.com/kb/HT3639 - (CONFIRM) http://support.apple.com/kb/HT3639 - Vendor Advisory
References (UBUNTU) http://www.ubuntu.com/usn/USN-857-1 - (UBUNTU) http://www.ubuntu.com/usn/USN-857-1 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - Mailing List
References (VUPEN) http://www.vupen.com/english/advisories/2011/0212 - (VUPEN) http://www.vupen.com/english/advisories/2011/0212 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2009/1621 - (VUPEN) http://www.vupen.com/english/advisories/2009/1621 - Broken Link
References (VUPEN) http://www.vupen.com/english/advisories/2009/1522 - Patch, Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2009/1522 - Broken Link, Patch, Vendor Advisory
References (EXPLOIT-DB) https://www.exploit-db.com/exploits/8907 - (EXPLOIT-DB) https://www.exploit-db.com/exploits/8907 - Exploit, Third Party Advisory, VDB Entry
References (BID) http://www.securityfocus.com/bid/35321 - (BID) http://www.securityfocus.com/bid/35321 - Broken Link, Third Party Advisory, VDB Entry
CVSS v2 : 7.1
v3 : unknown
v2 : 7.1
v3 : 7.5

Information

Published : 2009-06-10 18:00

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1699

Mitre link : CVE-2009-1699

CVE.ORG link : CVE-2009-1699


JSON object : View

Products Affected

canonical

  • ubuntu_linux

apple

  • iphone_os
  • safari

opensuse

  • opensuse
CWE
CWE-611

Improper Restriction of XML External Entity Reference