René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

167 lines
5.4 KiB
JSON

{
"id": "CVE-2009-1705",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-06-10T18:00:00.657",
"lastModified": "2009-06-13T05:33:27.577",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "CoreGraphics in Apple Safari before 4.0 on Windows does not properly use arithmetic during automatic hinting of TrueType fonts, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted font data."
},
{
"lang": "es",
"value": "CoreGraphics en Apple Safari anteriores a v4.0 en Windows no utiliza adecuadamente la aritm\u00e9tica durante la inicializaci\u00f3n autom\u00e1tica de las fuentes TrueType, lo que permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n o provocar una denegaci\u00f3n de servicio (consumo de memoria y ca\u00edda de aplicaci\u00f3n) a trav\u00e9s de una fuente de datos manipulada."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-189"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:-:windows:*:*:*:*:*",
"versionEndIncluding": "3.2.3",
"matchCriteriaId": "7E203D81-FABE-4A63-8930-1DA15A86E113"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.0:-:windows:*:*:*:*:*",
"matchCriteriaId": "49875E29-AA30-4D96-9ED9-538823DD5E1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.0.1:-:windows:*:*:*:*:*",
"matchCriteriaId": "D6C733F3-F5D4-4CF1-866D-61FF9D81D1B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.0.2:-:windows:*:*:*:*:*",
"matchCriteriaId": "C5471735-D9C0-491B-9A6A-07B39AA215CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.0.3:-:windows:*:*:*:*:*",
"matchCriteriaId": "1E5C52F3-2109-40FD-9945-A9A9D42C076E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.0.4:-:windows:*:*:*:*:*",
"matchCriteriaId": "151DEB6D-5857-4B0B-8449-5735768024A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.1:-:windows:*:*:*:*:*",
"matchCriteriaId": "AC7E7F65-8F3B-42F8-8B2D-9EA1CC4A4300"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.1.1:-:windows:*:*:*:*:*",
"matchCriteriaId": "476EBE1F-66E1-4EF5-8344-BEDA97F306A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.1.2:-:windows:*:*:*:*:*",
"matchCriteriaId": "480ED2AC-0DA4-44DA-A902-8534335077B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.2:-:windows:*:*:*:*:*",
"matchCriteriaId": "77F31F4B-5305-4D75-9277-95EF99A969A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.2.1:-:windows:*:*:*:*:*",
"matchCriteriaId": "C9AD216D-0C95-4843-A1A1-C3C9A6219277"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:3.2.2:-:windows:*:*:*:*:*",
"matchCriteriaId": "04B8652D-BE06-49CB-A636-8B53B2DF9168"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://support.apple.com/kb/HT3613",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/35260",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
]
},
{
"url": "http://www.securityfocus.com/bid/35308",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2009/1522",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}