{ "id": "CVE-2009-1705", "sourceIdentifier": "cve@mitre.org", "published": "2009-06-10T18:00:00.657", "lastModified": "2009-06-13T05:33:27.577", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "CoreGraphics in Apple Safari before 4.0 on Windows does not properly use arithmetic during automatic hinting of TrueType fonts, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted font data." }, { "lang": "es", "value": "CoreGraphics en Apple Safari anteriores a v4.0 en Windows no utiliza adecuadamente la aritm\u00e9tica durante la inicializaci\u00f3n autom\u00e1tica de las fuentes TrueType, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de una fuente de datos manipulada." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3 }, "baseSeverity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-189" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:*:-:windows:*:*:*:*:*", "versionEndIncluding": "3.2.3", "matchCriteriaId": "7E203D81-FABE-4A63-8930-1DA15A86E113" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.0:-:windows:*:*:*:*:*", "matchCriteriaId": "49875E29-AA30-4D96-9ED9-538823DD5E1C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.0.1:-:windows:*:*:*:*:*", "matchCriteriaId": "D6C733F3-F5D4-4CF1-866D-61FF9D81D1B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.0.2:-:windows:*:*:*:*:*", "matchCriteriaId": "C5471735-D9C0-491B-9A6A-07B39AA215CF" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.0.3:-:windows:*:*:*:*:*", "matchCriteriaId": "1E5C52F3-2109-40FD-9945-A9A9D42C076E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.0.4:-:windows:*:*:*:*:*", "matchCriteriaId": "151DEB6D-5857-4B0B-8449-5735768024A5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.1:-:windows:*:*:*:*:*", "matchCriteriaId": "AC7E7F65-8F3B-42F8-8B2D-9EA1CC4A4300" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.1.1:-:windows:*:*:*:*:*", "matchCriteriaId": "476EBE1F-66E1-4EF5-8344-BEDA97F306A4" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.1.2:-:windows:*:*:*:*:*", "matchCriteriaId": "480ED2AC-0DA4-44DA-A902-8534335077B9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.2:-:windows:*:*:*:*:*", "matchCriteriaId": "77F31F4B-5305-4D75-9277-95EF99A969A9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.2.1:-:windows:*:*:*:*:*", "matchCriteriaId": "C9AD216D-0C95-4843-A1A1-C3C9A6219277" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:3.2.2:-:windows:*:*:*:*:*", "matchCriteriaId": "04B8652D-BE06-49CB-A636-8B53B2DF9168" } ] } ] } ], "references": [ { "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://support.apple.com/kb/HT3613", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/35260", "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ] }, { "url": "http://www.securityfocus.com/bid/35308", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2009/1522", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] } ] }