ID CVE-2009-3384
Summary Multiple unspecified vulnerabilities in WebKit in Apple Safari before 4.0.4 on Windows allow remote FTP servers to execute arbitrary code, cause a denial of service (application crash), or obtain sensitive information via a crafted directory listing in a reply.
References
Vulnerable Configurations
  • cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.3_417.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.3_417.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.4_419.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.4_419.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0_pre:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0_pre:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.4_beta:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.4_beta:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:-:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.0b1:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*
  • cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:safari:2.0.4:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.0b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.1:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.1b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.2b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.3:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.3b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.4:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.0.4b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.1.0:-:mac:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.1.0b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.1.1b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.1.2b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.2.0b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.2.1b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*
    cpe:2.3:a:apple:safari:3.2.2b:-:windows:*:*:*:*:*
  • cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
    cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
CVSS
Base: 9.3 (as of 19-09-2017 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:M/Au:N/C:C/I:C/A:C
oval via4
accepted 2013-11-11T04:02:10.163-05:00
class vulnerability
contributors
  • name Sharath S
    organization SecPod Technologies
  • name Shane Shaffer
    organization G2, Inc.
  • name Maria Kedovskaya
    organization ALTX-SOFT
definition_extensions
comment Apple Safari is installed
oval oval:org.mitre.oval:def:6325
description Multiple unspecified vulnerabilities in WebKit in Apple Safari before 4.0.4 on Windows allow remote FTP servers to execute arbitrary code, cause a denial of service (application crash), or obtain sensitive information via a crafted directory listing in a reply.
family windows
id oval:org.mitre.oval:def:6362
status accepted
submitted 2009-11-17T18:28:46
title WebKit in Apple Safari Multiple Unspecified Vulnerabilities.
version 8
redhat via4
advisories
bugzilla
id 530569
title CVE-2009-3382 Firefox crashes with evidence of memory corruption
oval
OR
  • AND
    • comment Red Hat Enterprise Linux 4 is installed
      oval oval:com.redhat.rhba:tst:20070304001
    • OR
      • AND
        • comment nspr is earlier than 0:4.7.6-1.el4_8
          oval oval:com.redhat.rhsa:tst:20091530002
        • comment nspr is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20081036009
      • AND
        • comment nspr-devel is earlier than 0:4.7.6-1.el4_8
          oval oval:com.redhat.rhsa:tst:20091530004
        • comment nspr-devel is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20081036011
      • AND
        • comment firefox is earlier than 0:3.0.15-3.el4
          oval oval:com.redhat.rhsa:tst:20091530006
        • comment firefox is signed with Red Hat master key
          oval oval:com.redhat.rhsa:tst:20060733003
  • AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhba:tst:20070331001
    • OR
      • AND
        • comment nspr is earlier than 0:4.7.6-1.el5_4
          oval oval:com.redhat.rhsa:tst:20091530009
        • comment nspr is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20150925003
      • AND
        • comment nspr-devel is earlier than 0:4.7.6-1.el5_4
          oval oval:com.redhat.rhsa:tst:20091530011
        • comment nspr-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhba:tst:20150925005
      • AND
        • comment xulrunner is earlier than 0:1.9.0.15-3.el5_4
          oval oval:com.redhat.rhsa:tst:20091530013
        • comment xulrunner is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20080569003
      • AND
        • comment xulrunner-devel is earlier than 0:1.9.0.15-3.el5_4
          oval oval:com.redhat.rhsa:tst:20091530017
        • comment xulrunner-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20080569005
      • AND
        • comment xulrunner-devel-unstable is earlier than 0:1.9.0.15-3.el5_4
          oval oval:com.redhat.rhsa:tst:20091530015
        • comment xulrunner-devel-unstable is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20080569007
      • AND
        • comment firefox is earlier than 0:3.0.15-3.el5_4
          oval oval:com.redhat.rhsa:tst:20091530019
        • comment firefox is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20070097009
rhsa
id RHSA-2009:1530
released 2009-10-27
severity Critical
title RHSA-2009:1530: firefox security update (Critical)
rpms
  • nspr-0:4.7.6-1.el4_8
  • nspr-devel-0:4.7.6-1.el4_8
  • firefox-0:3.0.15-3.el4
  • nspr-0:4.7.6-1.el5_4
  • nspr-devel-0:4.7.6-1.el5_4
  • xulrunner-0:1.9.0.15-3.el5_4
  • xulrunner-devel-0:1.9.0.15-3.el5_4
  • xulrunner-devel-unstable-0:1.9.0.15-3.el5_4
  • firefox-0:3.0.15-3.el5_4
  • seamonkey-0:1.0.9-0.47.el3
  • seamonkey-chat-0:1.0.9-0.47.el3
  • seamonkey-devel-0:1.0.9-0.47.el3
  • seamonkey-dom-inspector-0:1.0.9-0.47.el3
  • seamonkey-js-debugger-0:1.0.9-0.47.el3
  • seamonkey-mail-0:1.0.9-0.47.el3
  • seamonkey-nspr-0:1.0.9-0.47.el3
  • seamonkey-nspr-devel-0:1.0.9-0.47.el3
  • seamonkey-nss-0:1.0.9-0.47.el3
  • seamonkey-nss-devel-0:1.0.9-0.47.el3
  • seamonkey-0:1.0.9-50.el4_8
  • seamonkey-chat-0:1.0.9-50.el4_8
  • seamonkey-devel-0:1.0.9-50.el4_8
  • seamonkey-dom-inspector-0:1.0.9-50.el4_8
  • seamonkey-js-debugger-0:1.0.9-50.el4_8
  • seamonkey-mail-0:1.0.9-50.el4_8
  • thunderbird-0:2.0.0.24-2.el5_4
  • thunderbird-0:1.5.0.12-25.el4
refmap via4
apple
  • APPLE-SA-2009-11-11-1
  • APPLE-SA-2010-02-02-1
bid 36995
confirm
fedora
  • FEDORA-2009-11487
  • FEDORA-2009-11491
osvdb 59943
sectrack 1023166
secunia
  • 37346
  • 37393
  • 37397
  • 43068
suse SUSE-SR:2011:002
vupen
  • ADV-2009-3217
  • ADV-2011-0212
xf safari-ftp-code-execution(54241)
Last major update 19-09-2017 - 01:29
Published 13-11-2009 - 15:30
Back to Top