2024-04-04 08:46:00 +00:00

179 lines
6.2 KiB
JSON

{
"id": "CVE-2010-0043",
"sourceIdentifier": "product-security@apple.com",
"published": "2010-03-15T13:28:25.433",
"lastModified": "2017-09-19T01:30:11.453",
"vulnStatus": "Modified",
"evaluatorComment": "Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html\r\n\r\n\r\n'ImageIO\r\nCVE-ID: CVE-2010-0043\r\nAvailable for: Windows 7, Vista, XP\r\nImpact: Processing a maliciously crafted TIFF image may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A memory corruption issue exists in the handling of\r\nTIFF images. Processing a maliciously crafted TIFF image may lead to\r\nan unexpected application termination or arbitrary code execution.\r\nThis issue is addressed through improved memory handling. Credit to\r\nGus Mueller of Flying Meat for reporting this issue.'",
"evaluatorSolution": "Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html\r\n\r\n'Safari 4.0.5 is available via the Apple Software Update application,\r\nor Apple's Safari download site at:\r\nhttp://www.apple.com/safari/download/'",
"descriptions": [
{
"lang": "en",
"value": "ImageIO in Apple Safari before 4.0.5 and iTunes before 9.1 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image."
},
{
"lang": "es",
"value": "ImageIO en Apple Safari en versiones anteriores a la v4.0.5 en Windows permite a usuarios remotos ejecutar comandos de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de una imagen TIFF modificada."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.0.4",
"matchCriteriaId": "B1816CD6-0159-4684-A54D-94866D3FE570"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BDA6DB4-A0DA-43CA-AABD-10EEEEB28EAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"matchCriteriaId": "02EAC196-AE43-4787-9AF9-E79E2E1BBA46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2FD40E4-D4C9-492E-8432-ABC9BD2C7E67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "36EA71E0-63F7-46FF-AF11-792741F27628"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80E36485-565D-4FAA-A6AD-57DF42D47462"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html",
"source": "product-security@apple.com"
},
{
"url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00003.html",
"source": "product-security@apple.com"
},
{
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html",
"source": "product-security@apple.com"
},
{
"url": "http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/39135",
"source": "product-security@apple.com"
},
{
"url": "http://support.apple.com/kb/HT4070",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://support.apple.com/kb/HT4077",
"source": "product-security@apple.com"
},
{
"url": "http://support.apple.com/kb/HT4105",
"source": "product-security@apple.com"
},
{
"url": "http://support.apple.com/kb/HT4225",
"source": "product-security@apple.com"
},
{
"url": "http://www.securityfocus.com/bid/38671",
"source": "product-security@apple.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/38673",
"source": "product-security@apple.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.securitytracker.com/id?1023706",
"source": "product-security@apple.com"
},
{
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6901",
"source": "product-security@apple.com"
}
]
}