CVE-2009-1725

WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
References
Link Resource
http://lists.apple.com/archives/security-announce/2009/Jul/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://osvdb.org/55739
http://secunia.com/advisories/35758
http://secunia.com/advisories/36057
http://secunia.com/advisories/36062
http://secunia.com/advisories/36347
http://secunia.com/advisories/36677
http://secunia.com/advisories/36790
http://secunia.com/advisories/37746
http://secunia.com/advisories/43068
http://support.apple.com/kb/HT3666 Patch Vendor Advisory
http://support.apple.com/kb/HT3860
http://websvn.kde.org/?view=rev&revision=1002162
http://websvn.kde.org/?view=rev&revision=1002163
http://websvn.kde.org/?view=rev&revision=1002164
http://www.debian.org/security/2009/dsa-1950
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330
http://www.securityfocus.com/bid/35607 Patch
http://www.securitytracker.com/id?1022526
http://www.ubuntu.com/usn/USN-836-1
http://www.ubuntu.com/usn/USN-857-1
http://www.vupen.com/english/advisories/2009/1827
http://www.vupen.com/english/advisories/2011/0212
https://bugzilla.redhat.com/show_bug.cgi?id=513813
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5777
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00931.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00933.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html
http://lists.apple.com/archives/security-announce/2009/Jul/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://osvdb.org/55739
http://secunia.com/advisories/35758
http://secunia.com/advisories/36057
http://secunia.com/advisories/36062
http://secunia.com/advisories/36347
http://secunia.com/advisories/36677
http://secunia.com/advisories/36790
http://secunia.com/advisories/37746
http://secunia.com/advisories/43068
http://support.apple.com/kb/HT3666 Patch Vendor Advisory
http://support.apple.com/kb/HT3860
http://websvn.kde.org/?view=rev&revision=1002162
http://websvn.kde.org/?view=rev&revision=1002163
http://websvn.kde.org/?view=rev&revision=1002164
http://www.debian.org/security/2009/dsa-1950
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330
http://www.securityfocus.com/bid/35607 Patch
http://www.securitytracker.com/id?1022526
http://www.ubuntu.com/usn/USN-836-1
http://www.ubuntu.com/usn/USN-857-1
http://www.vupen.com/english/advisories/2009/1827
http://www.vupen.com/english/advisories/2011/0212
https://bugzilla.redhat.com/show_bug.cgi?id=513813
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5777
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00931.html
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00933.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2009/Jul/msg00000.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2009/Jul/msg00000.html - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html - () http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://osvdb.org/55739 - () http://osvdb.org/55739 -
References () http://secunia.com/advisories/35758 - () http://secunia.com/advisories/35758 -
References () http://secunia.com/advisories/36057 - () http://secunia.com/advisories/36057 -
References () http://secunia.com/advisories/36062 - () http://secunia.com/advisories/36062 -
References () http://secunia.com/advisories/36347 - () http://secunia.com/advisories/36347 -
References () http://secunia.com/advisories/36677 - () http://secunia.com/advisories/36677 -
References () http://secunia.com/advisories/36790 - () http://secunia.com/advisories/36790 -
References () http://secunia.com/advisories/37746 - () http://secunia.com/advisories/37746 -
References () http://secunia.com/advisories/43068 - () http://secunia.com/advisories/43068 -
References () http://support.apple.com/kb/HT3666 - Patch, Vendor Advisory () http://support.apple.com/kb/HT3666 - Patch, Vendor Advisory
References () http://support.apple.com/kb/HT3860 - () http://support.apple.com/kb/HT3860 -
References () http://websvn.kde.org/?view=rev&revision=1002162 - () http://websvn.kde.org/?view=rev&revision=1002162 -
References () http://websvn.kde.org/?view=rev&revision=1002163 - () http://websvn.kde.org/?view=rev&revision=1002163 -
References () http://websvn.kde.org/?view=rev&revision=1002164 - () http://websvn.kde.org/?view=rev&revision=1002164 -
References () http://www.debian.org/security/2009/dsa-1950 - () http://www.debian.org/security/2009/dsa-1950 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2009:330 - () http://www.mandriva.com/security/advisories?name=MDVSA-2009:330 -
References () http://www.securityfocus.com/bid/35607 - Patch () http://www.securityfocus.com/bid/35607 - Patch
References () http://www.securitytracker.com/id?1022526 - () http://www.securitytracker.com/id?1022526 -
References () http://www.ubuntu.com/usn/USN-836-1 - () http://www.ubuntu.com/usn/USN-836-1 -
References () http://www.ubuntu.com/usn/USN-857-1 - () http://www.ubuntu.com/usn/USN-857-1 -
References () http://www.vupen.com/english/advisories/2009/1827 - () http://www.vupen.com/english/advisories/2009/1827 -
References () http://www.vupen.com/english/advisories/2011/0212 - () http://www.vupen.com/english/advisories/2011/0212 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=513813 - () https://bugzilla.redhat.com/show_bug.cgi?id=513813 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5777 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5777 -
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00931.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00931.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00933.html - () https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00933.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html -
References () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html - () https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html -

Information

Published : 2009-07-09 17:30

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1725

Mitre link : CVE-2009-1725

CVE.ORG link : CVE-2009-1725


JSON object : View

Products Affected

apple

  • iphone_os
  • safari
  • ipod_touch
CWE
CWE-189

Numeric Errors