mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
167 lines
5.4 KiB
JSON
167 lines
5.4 KiB
JSON
{
|
|
"id": "CVE-2009-1705",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2009-06-10T18:00:00.657",
|
|
"lastModified": "2009-06-13T05:33:27.577",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CoreGraphics in Apple Safari before 4.0 on Windows does not properly use arithmetic during automatic hinting of TrueType fonts, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted font data."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "CoreGraphics en Apple Safari anteriores a v4.0 en Windows no utiliza adecuadamente la aritm\u00e9tica durante la inicializaci\u00f3n autom\u00e1tica de las fuentes TrueType, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de una fuente de datos manipulada."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 9.3
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": true
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-189"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:*:-:windows:*:*:*:*:*",
|
|
"versionEndIncluding": "3.2.3",
|
|
"matchCriteriaId": "7E203D81-FABE-4A63-8930-1DA15A86E113"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.0:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "49875E29-AA30-4D96-9ED9-538823DD5E1C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.0.1:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "D6C733F3-F5D4-4CF1-866D-61FF9D81D1B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.0.2:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "C5471735-D9C0-491B-9A6A-07B39AA215CF"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.0.3:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "1E5C52F3-2109-40FD-9945-A9A9D42C076E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.0.4:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "151DEB6D-5857-4B0B-8449-5735768024A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.1:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "AC7E7F65-8F3B-42F8-8B2D-9EA1CC4A4300"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.1.1:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "476EBE1F-66E1-4EF5-8344-BEDA97F306A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.1.2:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "480ED2AC-0DA4-44DA-A902-8534335077B9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.2:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "77F31F4B-5305-4D75-9277-95EF99A969A9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.2.1:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "C9AD216D-0C95-4843-A1A1-C3C9A6219277"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:apple:safari:3.2.2:-:windows:*:*:*:*:*",
|
|
"matchCriteriaId": "04B8652D-BE06-49CB-A636-8B53B2DF9168"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://support.apple.com/kb/HT3613",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/35260",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/35308",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.vupen.com/english/advisories/2009/1522",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |