CVE-2009-1698

CVSS V2 High 9.3 CVSS V3 None
Description
WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not initialize a pointer during handling of a Cascading Style Sheets (CSS) attr function call with a large numerical argument, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
Overview
  • CVE ID
  • CVE-2009-1698
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2009-06-10T18:00:00
  • Last Modified Date
  • 2022-08-09T13:48:59
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* 1 OR 3.2.2
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* 1 OR
AND
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
Reference URL Reference Tags
http://www.zerodayinitiative.com/advisories/ZDI-09-032/ Patch
http://www.securityfocus.com/bid/35260 Exploit
http://secunia.com/advisories/35379 Vendor Advisory
http://support.apple.com/kb/HT3613 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1522 Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html Patch Vendor Advisory
http://securitytracker.com/id?1022345 Patch
http://osvdb.org/55006
http://www.securityfocus.com/bid/35318
http://blog.zoller.lu/2009/05/advisory-apple-safari-remote-code.html
http://www.vupen.com/english/advisories/2009/1621
http://support.apple.com/kb/HT3639
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
http://www.redhat.com/support/errata/RHSA-2009-1128.html
http://secunia.com/advisories/35588
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html
http://secunia.com/advisories/36057
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html
http://secunia.com/advisories/36062
http://www.ubuntu.com/usn/USN-822-1
http://www.debian.org/security/2009/dsa-1950
http://secunia.com/advisories/37746
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330
http://www.ubuntu.com/usn/USN-857-1
http://www.ubuntu.com/usn/USN-836-1
http://secunia.com/advisories/36790
http://www.vupen.com/english/advisories/2011/0212
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/43068
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9484
http://www.securityfocus.com/archive/1/504295/100/0/threaded
http://www.securityfocus.com/archive/1/504173/100/0/threaded
History
Created Old Value New Value Data Type Notes
2022-05-10 18:32:48 Added to TrackCVE