mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
184 lines
6.8 KiB
JSON
184 lines
6.8 KiB
JSON
{
|
|
"id": "CVE-2010-0047",
|
|
"sourceIdentifier": "product-security@apple.com",
|
|
"published": "2010-03-15T13:28:25.560",
|
|
"lastModified": "2017-09-19T01:30:11.703",
|
|
"vulnStatus": "Modified",
|
|
"evaluatorComment": "Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html\r\n\r\n'WebKit\r\nCVE-ID: CVE-2010-0047\r\nAvailable for: Mac OS X v10.4.11, Mac OS X Server v10.4.11,\r\nMac OS X v10.5.8, Mac OS X Server v10.5.8,\r\nMac OS X v10.6.1 or later, Mac OS X Server v10.6.1 or later,\r\nWindows 7, Vista, XP\r\nImpact: Visiting a maliciously crafted website may lead to an\r\nunexpected application termination or arbitrary code execution\r\nDescription: A use-after-free issue exists in the handling of HTML\r\nobject element fallback content. Visiting a maliciously crafted\r\nwebsite may lead to an unexpected application termination or\r\narbitrary code execution. This issue is addressed through improved\r\nmemory reference tracking. Credit to wushi of team509, working with\r\nTippingPoint's Zero Day Initiative for reporting this issue.'",
|
|
"evaluatorSolution": "Per: http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html\r\n\r\n'Safari 4.0.5 is available via the Apple Software Update application,\r\nor Apple's Safari download site at:\r\nhttp://www.apple.com/safari/download/'",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Use-after-free vulnerability in WebKit in Apple Safari before 4.0.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to \"HTML object element fallback content.\""
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad uso despu\u00e9s de la liberaci\u00f3n (use-after-free) en el WebKit en Apple Safari anterior v4.0.5 permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o causar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de vectores relacionados con \"HTML object element fallback content.\""
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-399"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
|
"versionEndIncluding": "4.0.4",
|
|
"matchCriteriaId": "B1816CD6-0159-4684-A54D-94866D3FE570"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9BDA6DB4-A0DA-43CA-AABD-10EEEEB28EAB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "02EAC196-AE43-4787-9AF9-E79E2E1BBA46"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2FD40E4-D4C9-492E-8432-ABC9BD2C7E67"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "36EA71E0-63F7-46FF-AF11-792741F27628"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80E36485-565D-4FAA-A6AD-57DF42D47462"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2010/Mar/msg00000.html",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041383.html",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041432.html",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041436.html",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/41856",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://secunia.com/advisories/43068",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://support.apple.com/kb/HT4070",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://support.apple.com/kb/HT4225",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:039",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/38671",
|
|
"source": "product-security@apple.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securitytracker.com/id?1023708",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://www.ubuntu.com/usn/USN-1006-1",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2010/2722",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0212",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2011/0552",
|
|
"source": "product-security@apple.com"
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6882",
|
|
"source": "product-security@apple.com"
|
|
}
|
|
]
|
|
} |