Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2877 (GCVE-0-2011-2877)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:31.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1026774", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026774" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/chromium/issues/detail?id=95072" }, { "name": "48377", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48377" }, { "name": "APPLE-SA-2012-03-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html" }, { "name": "48274", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48274" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "name": "APPLE-SA-2012-03-07-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html" }, { "name": "oval:org.mitre.oval:def:14694", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694" }, { "name": "48288", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48288" }, { "name": "APPLE-SA-2012-03-07-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-10-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \"stale font.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-05T18:57:01", "orgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "shortName": "Chrome" }, "references": [ { "name": "1026774", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026774" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/chromium/issues/detail?id=95072" }, { "name": "48377", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48377" }, { "name": "APPLE-SA-2012-03-12-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html" }, { "name": "48274", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48274" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "name": "APPLE-SA-2012-03-07-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html" }, { "name": "oval:org.mitre.oval:def:14694", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694" }, { "name": "48288", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48288" }, { "name": "APPLE-SA-2012-03-07-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2011-2877", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \"stale font.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1026774", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026774" }, { "name": "http://code.google.com/p/chromium/issues/detail?id=95072", "refsource": "CONFIRM", "url": "http://code.google.com/p/chromium/issues/detail?id=95072" }, { "name": "48377", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48377" }, { "name": "APPLE-SA-2012-03-12-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html" }, { "name": "48274", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48274" }, { "name": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "name": "APPLE-SA-2012-03-07-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html" }, { "name": "oval:org.mitre.oval:def:14694", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694" }, { "name": "48288", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48288" }, { "name": "APPLE-SA-2012-03-07-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ebfee0ef-53dd-4cf3-9e2a-08a5bd7a7e28", "assignerShortName": "Chrome", "cveId": "CVE-2011-2877", "datePublished": "2011-10-04T20:00:00", "dateReserved": "2011-07-20T00:00:00", "dateUpdated": "2024-08-06T23:15:31.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-2877\",\"sourceIdentifier\":\"chrome-cve-admin@google.com\",\"published\":\"2011-10-04T20:55:01.567\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \\\"stale font.\\\"\"},{\"lang\":\"es\",\"value\":\"Google Chrome antes de v14.0.835.202 no controla correctamente el texto SVG, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de vectores desconocidos que conducen a una fuente de letra bloqueada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"14.0.835.202\",\"matchCriteriaId\":\"FB9CA493-603C-4543-B2FB-322C98504C6C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.6\",\"matchCriteriaId\":\"CA2DCF16-0EEA-40BD-9855-CC08F58A2CEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.1.4\",\"matchCriteriaId\":\"7DE4C7C6-8958-4FF7-9338-D59D325E29FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.1\",\"matchCriteriaId\":\"4B150860-FC76-4DDC-9FEE-BC5D96D08751\"}]}]}],\"references\":[{\"url\":\"http://code.google.com/p/chromium/issues/detail?id=95072\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/48274\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/48288\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://secunia.com/advisories/48377\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://www.securitytracker.com/id?1026774\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694\",\"source\":\"chrome-cve-admin@google.com\"},{\"url\":\"http://code.google.com/p/chromium/issues/detail?id=95072\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48274\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48288\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/48377\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1026774\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
CERTA-2012-AVI-127
Vulnerability from certfr_avis
De multiples vulnérabilités, permettant notamment l'exécution de code arbitraire à distance, ont été corrigées dans Apple iOS.
Description
De multiples vulnérabilités ont été corrigées dans Apple iOS. Ces vulnérabilités peuvent notamment être utilisées par une personne malintentionnée pour provoquer l'exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "iPhone 3GS, 4 et 4S avec iOS versions ant\u00e9rieures \u00e0 5.1 ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iPod 3\u00e8me g\u00e9n\u00e9ration avec iOS versions ant\u00e9rieurs \u00e0 5.1 ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iPad 1 et 2 avec iOS versions ant\u00e9rieures \u00e0 5.1.", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Apple iOS. Ces\nvuln\u00e9rabilit\u00e9s peuvent notamment \u00eatre utilis\u00e9es par une personne\nmalintentionn\u00e9e pour provoquer l\u0027ex\u00e9cution de code arbitraire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-0602", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0602" }, { "name": "CVE-2012-0589", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0589" }, { "name": "CVE-2012-0597", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0597" }, { "name": "CVE-2011-2860", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2860" }, { "name": "CVE-2011-2855", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2855" }, { "name": "CVE-2012-0628", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0628" }, { "name": "CVE-2012-0623", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0623" }, { "name": "CVE-2012-0588", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0588" }, { "name": "CVE-2012-0607", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0607" }, { "name": "CVE-2011-2867", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2867" }, { "name": "CVE-2012-0613", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0613" }, { "name": "CVE-2011-2847", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2847" }, { "name": "CVE-2012-0630", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0630" }, { "name": "CVE-2012-0587", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0587" }, { "name": "CVE-2011-2825", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2825" }, { "name": "CVE-2012-0586", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0586" }, { "name": "CVE-2011-2846", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2846" }, { "name": "CVE-2011-3453", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3453" }, { "name": "CVE-2012-0608", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0608" }, { "name": "CVE-2012-0590", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0590" }, { "name": "CVE-2012-0606", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0606" }, { "name": "CVE-2012-0633", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0633" }, { "name": "CVE-2011-3885", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3885" }, { "name": "CVE-2012-0595", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0595" }, { "name": "CVE-2012-0596", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0596" }, { "name": "CVE-2012-0627", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0627" }, { "name": "CVE-2012-0626", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0626" }, { "name": "CVE-2012-0593", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0593" }, { "name": "CVE-2012-0617", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0617" }, { "name": "CVE-2012-0644", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0644" }, { "name": "CVE-2012-0592", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0592" }, { "name": "CVE-2011-2873", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2873" }, { "name": "CVE-2012-0585", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0585" }, { "name": "CVE-2012-0611", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0611" }, { "name": "CVE-2012-0612", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0612" }, { "name": "CVE-2012-0599", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0599" }, { "name": "CVE-2012-0601", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0601" }, { "name": "CVE-2011-3928", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3928" }, { "name": "CVE-2012-0614", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0614" }, { "name": "CVE-2012-0643", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0643" }, { "name": "CVE-2012-0616", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0616" }, { "name": "CVE-2012-0609", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0609" }, { "name": "CVE-2012-0621", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0621" }, { "name": "CVE-2012-0631", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0631" }, { "name": "CVE-2012-0600", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0600" }, { "name": "CVE-2011-2857", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2857" }, { "name": "CVE-2011-2868", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2868" }, { "name": "CVE-2011-3909", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3909" }, { "name": "CVE-2012-0618", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0618" }, { "name": "CVE-2012-0622", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0622" }, { "name": "CVE-2011-2869", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2869" }, { "name": "CVE-2012-0624", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0624" }, { "name": "CVE-2012-0604", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0604" }, { "name": "CVE-2012-0620", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0620" }, { "name": "CVE-2012-0603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0603" }, { "name": "CVE-2011-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3888" }, { "name": "CVE-2012-0629", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0629" }, { "name": "CVE-2011-2854", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2854" }, { "name": "CVE-2012-0610", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0610" }, { "name": "CVE-2012-0632", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0632" }, { "name": "CVE-2012-0642", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0642" }, { "name": "CVE-2012-0646", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0646" }, { "name": "CVE-2012-0619", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0619" }, { "name": "CVE-2011-2870", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2870" }, { "name": "CVE-2012-0641", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0641" }, { "name": "CVE-2011-2833", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2833" }, { "name": "CVE-2012-0645", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0645" }, { "name": "CVE-2012-0594", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0594" }, { "name": "CVE-2011-3908", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3908" }, { "name": "CVE-2012-0625", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0625" }, { "name": "CVE-2012-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0605" }, { "name": "CVE-2011-2871", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2871" }, { "name": "CVE-2012-0635", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0635" }, { "name": "CVE-2012-0615", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0615" }, { "name": "CVE-2012-0591", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0591" }, { "name": "CVE-2011-3897", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3897" }, { "name": "CVE-2012-0598", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0598" }, { "name": "CVE-2011-2877", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2877" }, { "name": "CVE-2011-2872", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2872" }, { "name": "CVE-2011-3887", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3887" }, { "name": "CVE-2011-3881", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3881" } ], "initial_release_date": "2012-03-09T00:00:00", "last_revision_date": "2012-03-09T00:00:00", "links": [], "reference": "CERTA-2012-AVI-127", "revisions": [ { "description": "version initiale.", "revision_date": "2012-03-09T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s, permettant notamment l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance, ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eApple\niOS\u003c/span\u003e.\n", "title": "Vuln\u00e9rabilit\u00e9s dans Apple iOS", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple du 07 mars 2012", "url": "http://support.apple.com/kb/HT1222" } ] }
CERTA-2012-AVI-126
Vulnerability from certfr_avis
De multiples vulnérabilités, permettant notamment l'exécution de code arbitraire à distance, ont été corrigées dans iTunes.
Description
De multiples vulnérabilités ont été corrigées dans iTunes. Ces vulnérabilités peuvent être utilisées par une personne malintentionnée pour provoquer l'exécution de code arbitraire, en exploitant des vulnérabilités présentes dans WebKit.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
iTunes versions antérieures à 10.6.
Vendor | Product | Description |
---|
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cp\u003eiTunes versions ant\u00e9rieures \u00e0 10.6.\u003c/p\u003e", "content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans iTunes. Ces\nvuln\u00e9rabilit\u00e9s peuvent \u00eatre utilis\u00e9es par une personne malintentionn\u00e9e\npour provoquer l\u0027ex\u00e9cution de code arbitraire, en exploitant des\nvuln\u00e9rabilit\u00e9s pr\u00e9sentes dans WebKit.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-0602", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0602" }, { "name": "CVE-2012-0597", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0597" }, { "name": "CVE-2011-2860", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2860" }, { "name": "CVE-2011-2855", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2855" }, { "name": "CVE-2012-0628", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0628" }, { "name": "CVE-2012-0623", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0623" }, { "name": "CVE-2012-0607", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0607" }, { "name": "CVE-2011-2867", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2867" }, { "name": "CVE-2012-0613", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0613" }, { "name": "CVE-2011-2847", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2847" }, { "name": "CVE-2012-0630", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0630" }, { "name": "CVE-2011-2866", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2866" }, { "name": "CVE-2011-2825", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2825" }, { "name": "CVE-2011-2846", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2846" }, { "name": "CVE-2012-0608", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0608" }, { "name": "CVE-2012-0606", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0606" }, { "name": "CVE-2012-0633", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0633" }, { "name": "CVE-2011-3885", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3885" }, { "name": "CVE-2012-0595", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0595" }, { "name": "CVE-2012-0596", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0596" }, { "name": "CVE-2012-0627", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0627" }, { "name": "CVE-2012-0626", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0626" }, { "name": "CVE-2012-0593", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0593" }, { "name": "CVE-2012-0617", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0617" }, { "name": "CVE-2012-0592", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0592" }, { "name": "CVE-2011-2873", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2873" }, { "name": "CVE-2012-0611", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0611" }, { "name": "CVE-2012-0612", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0612" }, { "name": "CVE-2012-0599", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0599" }, { "name": "CVE-2012-0601", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0601" }, { "name": "CVE-2012-0614", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0614" }, { "name": "CVE-2012-0616", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0616" }, { "name": "CVE-2012-0609", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0609" }, { "name": "CVE-2012-0621", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0621" }, { "name": "CVE-2012-0631", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0631" }, { "name": "CVE-2012-0600", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0600" }, { "name": "CVE-2011-2857", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2857" }, { "name": "CVE-2011-2868", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2868" }, { "name": "CVE-2011-3909", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3909" }, { "name": "CVE-2012-0618", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0618" }, { "name": "CVE-2012-0622", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0622" }, { "name": "CVE-2011-2869", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2869" }, { "name": "CVE-2012-0624", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0624" }, { "name": "CVE-2012-0604", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0604" }, { "name": "CVE-2012-0634", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0634" }, { "name": "CVE-2012-0620", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0620" }, { "name": "CVE-2012-0603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0603" }, { "name": "CVE-2011-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3888" }, { "name": "CVE-2012-0637", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0637" }, { "name": "CVE-2012-0629", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0629" }, { "name": "CVE-2011-2854", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2854" }, { "name": "CVE-2012-0610", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0610" }, { "name": "CVE-2012-0648", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0648" }, { "name": "CVE-2012-0632", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0632" }, { "name": "CVE-2012-0619", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0619" }, { "name": "CVE-2011-2870", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2870" }, { "name": "CVE-2011-2833", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2833" }, { "name": "CVE-2012-0594", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0594" }, { "name": "CVE-2011-3908", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3908" }, { "name": "CVE-2012-0625", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0625" }, { "name": "CVE-2012-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0605" }, { "name": "CVE-2011-2871", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2871" }, { "name": "CVE-2012-0635", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0635" }, { "name": "CVE-2012-0615", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0615" }, { "name": "CVE-2012-0636", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0636" }, { "name": "CVE-2012-0591", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0591" }, { "name": "CVE-2012-0639", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0639" }, { "name": "CVE-2011-3897", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3897" }, { "name": "CVE-2012-0598", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0598" }, { "name": "CVE-2011-2877", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2877" }, { "name": "CVE-2011-2872", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2872" }, { "name": "CVE-2012-0638", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0638" } ], "initial_release_date": "2012-03-09T00:00:00", "last_revision_date": "2012-03-09T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Apple 07 mars 2012 :", "url": "http://support.apple.com/kb/HT1222" } ], "reference": "CERTA-2012-AVI-126", "revisions": [ { "description": "version initiale.", "revision_date": "2012-03-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s, permettant notamment l\u0027ex\u00e9cution de code\narbitraire \u00e0 distance, ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eiTunes\u003c/span\u003e.\n", "title": "Vuln\u00e9rabilit\u00e9s dans iTunes", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple du 07 mars 2012", "url": null } ] }
CERTA-2012-AVI-141
Vulnerability from certfr_avis
De très nombreuses vulnérabilités ont été corrigées dans Safari, pour de nombreux impacts dont l'exécution de code arbitraire à distance.
Description
De très nombreuses vulnérabilités ont été corrigées dans le navigateur Safari :
- de multiples problèmes de corruption mémoire permettent à un attaquant d'exécuter du code arbitraire sur le client à l'aide de pages Web spécialement conçues ;
- l'affichage des caractères dans la barre d'adresse permet de tromper un utilisateur sur l'identité du site qu'il visite ;
- certaines informations sur l'historique des pages visitées sont enregistrées même quand l'option 'Navigation privée' est activée ;
- plusieurs vulnérabilités permettent une injection de code indirecte à distance;
- des cookies peuvent être révélés à un site illégitime.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Safari pour Mac OS et Windows versions antérieures à 5.1.4.
Vendor | Product | Description |
---|
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cp\u003eSafari pour Mac OS et Windows versions ant\u00e9rieures \u00e0 5.1.4.\u003c/p\u003e", "content": "## Description\n\nDe tr\u00e8s nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans le navigateur\nSafari :\n\n- de multiples probl\u00e8mes de corruption m\u00e9moire permettent \u00e0 un\n attaquant d\u0027ex\u00e9cuter du code arbitraire sur le client \u00e0 l\u0027aide de\n pages Web sp\u00e9cialement con\u00e7ues ;\n- l\u0027affichage des caract\u00e8res dans la barre d\u0027adresse permet de tromper\n un utilisateur sur l\u0027identit\u00e9 du site qu\u0027il visite ;\n- certaines informations sur l\u0027historique des pages visit\u00e9es sont\n enregistr\u00e9es m\u00eame quand l\u0027option \u0027Navigation priv\u00e9e\u0027 est activ\u00e9e ;\n- plusieurs vuln\u00e9rabilit\u00e9s permettent une injection de code indirecte\n \u00e0 distance;\n- des cookies peuvent \u00eatre r\u00e9v\u00e9l\u00e9s \u00e0 un site ill\u00e9gitime.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2012-0602", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0602" }, { "name": "CVE-2012-0589", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0589" }, { "name": "CVE-2012-0597", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0597" }, { "name": "CVE-2011-2860", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2860" }, { "name": "CVE-2011-2855", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2855" }, { "name": "CVE-2012-0628", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0628" }, { "name": "CVE-2012-0623", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0623" }, { "name": "CVE-2012-0588", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0588" }, { "name": "CVE-2012-0607", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0607" }, { "name": "CVE-2011-2867", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2867" }, { "name": "CVE-2012-0640", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0640" }, { "name": "CVE-2012-0613", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0613" }, { "name": "CVE-2011-2847", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2847" }, { "name": "CVE-2012-0630", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0630" }, { "name": "CVE-2011-2866", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2866" }, { "name": "CVE-2012-0587", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0587" }, { "name": "CVE-2011-2825", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2825" }, { "name": "CVE-2012-0586", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0586" }, { "name": "CVE-2011-2846", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2846" }, { "name": "CVE-2012-0608", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0608" }, { "name": "CVE-2012-0590", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0590" }, { "name": "CVE-2012-0606", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0606" }, { "name": "CVE-2012-0633", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0633" }, { "name": "CVE-2011-3885", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3885" }, { "name": "CVE-2012-0595", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0595" }, { "name": "CVE-2012-0596", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0596" }, { "name": "CVE-2012-0627", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0627" }, { "name": "CVE-2012-0626", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0626" }, { "name": "CVE-2012-0593", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0593" }, { "name": "CVE-2012-0617", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0617" }, { "name": "CVE-2012-0592", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0592" }, { "name": "CVE-2011-2873", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2873" }, { "name": "CVE-2012-0585", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0585" }, { "name": "CVE-2012-0611", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0611" }, { "name": "CVE-2012-0612", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0612" }, { "name": "CVE-2012-0599", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0599" }, { "name": "CVE-2012-0601", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0601" }, { "name": "CVE-2011-3928", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3928" }, { "name": "CVE-2012-0614", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0614" }, { "name": "CVE-2012-0616", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0616" }, { "name": "CVE-2012-0609", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0609" }, { "name": "CVE-2012-0621", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0621" }, { "name": "CVE-2012-0631", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0631" }, { "name": "CVE-2012-0600", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0600" }, { "name": "CVE-2011-2857", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2857" }, { "name": "CVE-2012-0584", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0584" }, { "name": "CVE-2011-2868", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2868" }, { "name": "CVE-2011-3909", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3909" }, { "name": "CVE-2012-0618", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0618" }, { "name": "CVE-2012-0622", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0622" }, { "name": "CVE-2011-2869", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2869" }, { "name": "CVE-2012-0624", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0624" }, { "name": "CVE-2012-0604", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0604" }, { "name": "CVE-2012-0620", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0620" }, { "name": "CVE-2012-0603", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0603" }, { "name": "CVE-2011-3888", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3888" }, { "name": "CVE-2012-0647", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0647" }, { "name": "CVE-2012-0637", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0637" }, { "name": "CVE-2012-0629", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0629" }, { "name": "CVE-2011-2854", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2854" }, { "name": "CVE-2012-0610", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0610" }, { "name": "CVE-2012-0648", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0648" }, { "name": "CVE-2012-0632", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0632" }, { "name": "CVE-2012-0619", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0619" }, { "name": "CVE-2011-2870", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2870" }, { "name": "CVE-2011-2833", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2833" }, { "name": "CVE-2012-0594", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0594" }, { "name": "CVE-2011-3908", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3908" }, { "name": "CVE-2012-0625", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0625" }, { "name": "CVE-2012-0605", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0605" }, { "name": "CVE-2011-2871", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2871" }, { "name": "CVE-2012-0635", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0635" }, { "name": "CVE-2012-0615", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0615" }, { "name": "CVE-2012-0636", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0636" }, { "name": "CVE-2012-0591", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0591" }, { "name": "CVE-2012-0639", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0639" }, { "name": "CVE-2011-3897", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3897" }, { "name": "CVE-2012-0598", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0598" }, { "name": "CVE-2011-2877", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2877" }, { "name": "CVE-2011-2872", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2872" }, { "name": "CVE-2012-0638", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0638" }, { "name": "CVE-2011-3887", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3887" }, { "name": "CVE-2011-3881", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3881" } ], "initial_release_date": "2012-03-14T00:00:00", "last_revision_date": "2012-03-14T00:00:00", "links": [], "reference": "CERTA-2012-AVI-141", "revisions": [ { "description": "version initiale.", "revision_date": "2012-03-14T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De tr\u00e8s nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Safari, pour de\nnombreux impacts dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Safari", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Apple HT5190 du 12 mars 2012", "url": "http://support.apple.com/kb/HT5190" } ] }
CERTA-2011-AVI-550
Vulnerability from certfr_avis
De multiples vulnérabilités permettant l'éxécution de code arbitraire à distance ont été corrigées dans Google Chrome.
Description
Sept vulnérabilités ont été corrigées dans Google Chrome. Ces vulnérabilitées permettent à une personne malintentionnée d'éxécuter du code arbitraire à distance et de contourner la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Google Chrome versions antérieures à 14.0.835.202.
Vendor | Product | Description |
---|
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cp\u003eGoogle Chrome versions ant\u00e9rieures \u00e0 14.0.835.202.\u003c/p\u003e", "content": "## Description\n\nSept vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Google Chrome. Ces\nvuln\u00e9rabilit\u00e9es permettent \u00e0 une personne malintentionn\u00e9e d\u0027\u00e9x\u00e9cuter du\ncode arbitraire \u00e0 distance et de contourner la politique de s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2011-2881", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2881" }, { "name": "CVE-2011-2878", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2878" }, { "name": "CVE-2011-2876", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2876" }, { "name": "CVE-2011-2873", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2873" }, { "name": "CVE-2011-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2879" }, { "name": "CVE-2011-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2880" }, { "name": "CVE-2011-2877", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2877" } ], "initial_release_date": "2011-10-06T00:00:00", "last_revision_date": "2011-10-06T00:00:00", "links": [ { "title": "Note de version de Google Chrome du 06 octobre 2011 :", "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" } ], "reference": "CERTA-2011-AVI-550", "revisions": [ { "description": "version initiale.", "revision_date": "2011-10-06T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s permettant l\u0027\u00e9x\u00e9cution de code arbitraire \u00e0\ndistance ont \u00e9t\u00e9 corrig\u00e9es dans Google Chrome.\n", "title": "Vuln\u00e9rabilit\u00e9s dans Google Chrome", "vendor_advisories": [ { "published_at": null, "title": "Note de version de Google Chrome du 04 octobre 2011", "url": null } ] }
gsd-2011-2877
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-2877", "description": "Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \"stale font.\"", "id": "GSD-2011-2877" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-2877" ], "details": "Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \"stale font.\"", "id": "GSD-2011-2877", "modified": "2023-12-13T01:19:06.722338Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2011-2877", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \"stale font.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1026774", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026774" }, { "name": "http://code.google.com/p/chromium/issues/detail?id=95072", "refsource": "CONFIRM", "url": "http://code.google.com/p/chromium/issues/detail?id=95072" }, { "name": "48377", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48377" }, { "name": "APPLE-SA-2012-03-12-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html" }, { "name": "48274", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48274" }, { "name": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html", "refsource": "CONFIRM", "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "name": "APPLE-SA-2012-03-07-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html" }, { "name": "oval:org.mitre.oval:def:14694", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694" }, { "name": "48288", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48288" }, { "name": "APPLE-SA-2012-03-07-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "14.0.835.202", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "10.6", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.1", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@google.com", "ID": "CVE-2011-2877" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \"stale font.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://code.google.com/p/chromium/issues/detail?id=95072", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "http://code.google.com/p/chromium/issues/detail?id=95072" }, { "name": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "name": "APPLE-SA-2012-03-07-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html" }, { "name": "APPLE-SA-2012-03-07-2", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" }, { "name": "APPLE-SA-2012-03-12-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html" }, { "name": "oval:org.mitre.oval:def:14694", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694" }, { "name": "1026774", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1026774" }, { "name": "48288", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48288" }, { "name": "48274", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48274" }, { "name": "48377", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/48377" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": true } }, "lastModifiedDate": "2020-05-08T21:22Z", "publishedDate": "2011-10-04T20:55Z" } } }
ghsa-m4xh-2vrv-g976
Vulnerability from github
Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale font."
{ "affected": [], "aliases": [ "CVE-2011-2877" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-10-04T20:55:00Z", "severity": "MODERATE" }, "details": "Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \"stale font.\"", "id": "GHSA-m4xh-2vrv-g976", "modified": "2022-05-13T01:26:48Z", "published": "2022-05-13T01:26:48Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2877" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694" }, { "type": "WEB", "url": "http://code.google.com/p/chromium/issues/detail?id=95072" }, { "type": "WEB", "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/48274" }, { "type": "WEB", "url": "http://secunia.com/advisories/48288" }, { "type": "WEB", "url": "http://secunia.com/advisories/48377" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1026774" } ], "schema_version": "1.4.0", "severity": [] }
var-201110-0410
Vulnerability from variot
Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to "stale font.". Google Chrome Used in Webkit Is SVG Insufficient operation of text due to improper handling of text (DoS) There are vulnerabilities that can be in a state or are otherwise unaffected. plural Apple Product Webkit A similar vulnerability exists for. Detail is Apple See vendor information for.Service disruption by a third party (DoS) You may be put into a state or affected by other details. Google Chrome is prone to multiple vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the browser, cause denial-of-service conditions, and bypass the same-origin policy; other attacks may also be possible. Versions prior to Chrome 14.0.835.202 are vulnerable. Google Chrome is a web browser developed by Google (Google). These could be used in a malicious web site to direct the user to a spoofed site that visually appears to be a legitimate domain. This issue is addressed through an improved domain name validity check. This issue does not affect OS X systems. CVE-ID CVE-2012-0640 : nshah
WebKit Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.3, OS X Lion Server v10.7.3, Windows 7, Vista, XP SP2 or later Impact: HTTP authentication credentials may be inadvertently disclosed to another site Description: If a site uses HTTP authentication and redirects to another site, the authentication credentials may be sent to the other site. ----------------------------------------------------------------------
Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch
TITLE: Apple iOS Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA48288
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48288/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48288
RELEASE DATE: 2012-03-09
DISCUSS ADVISORY: http://secunia.com/advisories/48288/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/48288/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=48288
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A weakness and multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to bypass certain security restrictions and by malicious people to disclose sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's device.
1) An error within the CFNetwork component when handling URLs can be exploited to disclose sensitive information by tricking the user into visiting a malicious website.
3) A logic error within the kernel does not properly handle debug system calls and can be exploited to bypass the sandbox restrictions.
4) An integer overflow error within the libresolv library when handling DNS resource records can be exploited to corrupt heap memory.
9) A cross-origin error in the WebKit component can be exploited to bypass the same-origin policy and disclose a cookie by tricking the user into visiting a malicious website.
10) An error within the WebKit component when handling drag-and-drop actions can be exploited to conduct cross-site scripting attacks.
11) Multiple unspecified errors within the WebKit component can be exploited to conduct cross-site scripting attacks.
12) Some vulnerabilities are caused due to a bundled vulnerable version of WebKit.
SOLUTION: Apply iOS 5.1 Software Update.
PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Erling Ellingsen, Facebook. 2, 8) pod2g. 3) 2012 iOS Jailbreak Dream Team. 5) Roland Kohler, the German Federal Ministry of Economics and Technology. 6) Eric Melville, American Express. 9) Sergey Glazunov.
ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT5192
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2012-03-07-2 iOS 5.1 Software Update
iOS 5.1 Software Update is now available and addresses the following:
CFNetwork Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Visiting a maliciously crafted website may lead to the disclosure of sensitive information Description: An issue existed in CFNetwork's handling of malformed URLs. When accessing a maliciously crafted URL, CFNetwork could send unexpected request headers. CVE-ID CVE-2012-0641 : Erling Ellingsen of Facebook
HFS Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Mounting a maliciously crafted disk image may lead to a device shutdown or arbitrary code execution Description: An integer underflow existed with the handling of HFS catalog files. CVE-ID CVE-2012-0642 : pod2g
Kernel Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: A malicious program could bypass sandbox restrictions Description: A logic issue existed in the handling of debug system calls. This may allow a malicious program to gain code execution in other programs with the same user privileges. CVE-ID CVE-2012-0643 : 2012 iOS Jailbreak Dream Team
libresolv Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Applications that use the libresolv library may be vulnerable to an unexpected application termination or arbitrary code execution Description: An integer overflow existed in the handling of DNS resource records, which may lead to heap memory corruption. CVE-ID CVE-2011-3453 : Ilja van Sprundel of IOActive
Passcode Lock Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: A person with physical access to the device may be able to bypass the screen lock Description: A race condition issue existed in the handling of slide to dial gestures. This may allow a person with physical access to the device to bypass the Passcode Lock screen. CVE-ID CVE-2012-0644 : Roland Kohler of the German Federal Ministry of Economics and Technology
Safari Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Web page visits may be recorded in browser history even when Private Browsing is active Description: Safari's Private Browsing is designed to prevent recording of a browsing session. Pages visited as a result of a site using the JavaScript methods pushState or replaceState were recorded in the browser history even when Private Browsing mode was active. This issue is addressed by not recording such visits when Private Browsing is active. CVE-ID CVE-2012-0585 : Eric Melville of American Express
Siri Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: An attacker with physical access to a locked phone could get access to frontmost email message Description: A design issue existed in Siri's lock screen restrictions. If Siri was enabled for use on the lock screen, and Mail was open with a message selected behind the lock screen, a voice command could be used to send that message to an arbitrary recipient. This issue is addressed by disabling forwarding of active messages from the lock screen. CVE-ID CVE-2012-0645
VPN Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: A maliciously crafted system configuration file may lead to arbitrary code execution with system privileges Description: A format string vulnerability existed in the handling of racoon configuration files. CVE-ID CVE-2012-0646 : pod2g
WebKit Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Visiting a maliciously crafted website may lead to the disclosure of cookies Description: A cross-origin issue existed in WebKit, which may allow cookies to be disclosed across origins. CVE-ID CVE-2011-3887 : Sergey Glazunov
WebKit Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Visiting a maliciously crafted website and dragging content with the mouse may lead to a cross-site scripting attack Description: A cross-origin issue existed in WebKit, which may allow content to be dragged and dropped across origins. CVE-ID CVE-2012-0590 : Adam Barth of Google Chrome Security Team
WebKit Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: Multiple cross-origin issues existed in WebKit. CVE-ID CVE-2011-3881 : Sergey Glazunov CVE-2012-0586 : Sergey Glazunov CVE-2012-0587 : Sergey Glazunov CVE-2012-0588 : Jochen Eisinger of Google Chrome Team CVE-2012-0589 : Alan Austin of polyvore.com
WebKit Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. CVE-ID CVE-2011-2825 : wushi of team509 working with TippingPoint's Zero Day Initiative CVE-2011-2833 : Apple CVE-2011-2846 : Arthur Gerkis, miaubiz CVE-2011-2847 : miaubiz, Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2854 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2855 : Arthur Gerkis, wushi of team509 working with iDefense VCP CVE-2011-2857 : miaubiz CVE-2011-2860 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2867 : Dirk Schulze CVE-2011-2868 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2869 : Cris Neckar of Google Chrome Security Team using AddressSanitizer CVE-2011-2870 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2871 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2872 : Abhishek Arya (Inferno) and Cris Neckar of Google Chrome Security Team using AddressSanitizer CVE-2011-2873 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2011-2877 : miaubiz CVE-2011-3885 : miaubiz CVE-2011-3888 : miaubiz CVE-2011-3897 : pa_kt working with TippingPoint's Zero Day Initiative CVE-2011-3908 : Aki Helin of OUSPG CVE-2011-3909 : Google Chrome Security Team (scarybeasts) and Chu CVE-2011-3928 : wushi of team509 working with TippingPoint's Zero Day Initiative CVE-2012-0591 : miaubiz, and Martin Barbella CVE-2012-0592 : Alexander Gavrun working with TippingPoint's Zero Day Initiative CVE-2012-0593 : Lei Zhang of the Chromium development community CVE-2012-0594 : Adam Klein of the Chromium development community CVE-2012-0595 : Apple CVE-2012-0596 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0597 : miaubiz CVE-2012-0598 : Sergey Glazunov CVE-2012-0599 : Dmytro Gorbunov of SaveSources.com CVE-2012-0600 : Marshall Greenblatt, Dharani Govindan of Google Chrome, miaubiz, Aki Helin of OUSPG, Apple CVE-2012-0601 : Apple CVE-2012-0602 : Apple CVE-2012-0603 : Apple CVE-2012-0604 : Apple CVE-2012-0605 : Apple CVE-2012-0606 : Apple CVE-2012-0607 : Apple CVE-2012-0608 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0609 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0610 : miaubiz, Martin Barbella using AddressSanitizer CVE-2012-0611 : Martin Barbella using AddressSanitizer CVE-2012-0612 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0613 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0614 : miaubiz, Martin Barbella using AddressSanitizer CVE-2012-0615 : Martin Barbella using AddressSanitizer CVE-2012-0616 : miaubiz CVE-2012-0617 : Martin Barbella using AddressSanitizer CVE-2012-0618 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0619 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0620 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0621 : Martin Barbella using AddressSanitizer CVE-2012-0622 : Dave Levin and Abhishek Arya of the Google Chrome Security Team CVE-2012-0623 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0624 : Martin Barbella using AddressSanitizer CVE-2012-0625 : Martin Barbella CVE-2012-0626 : Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0627 : Apple CVE-2012-0628 : Slawomir Blazek, miaubiz, Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer CVE-2012-0629 : Abhishek Arya (Inferno) of Google Chrome Security Team CVE-2012-0630 : Sergio Villar Senin of Igalia CVE-2012-0631 : Abhishek Arya (Inferno) of Google Chrome Security Team CVE-2012-0632 : Cris Neckar of the Google Chrome Security Team using AddressSanitizer CVE-2012-0633 : Apple CVE-2012-0635 : Julien Chaffraix of the Chromium development community, Martin Barbella using AddressSanitizer
Installation note:
This update is only available through iTunes, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/
iTunes will automatically check Apple's update server on its weekly schedule. When an update is detected, it will download it. When the iPhone, iPod touch or iPad is docked, iTunes will present the user with the option to install the update. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iPhone, iPod touch, or iPad.
The automatic update process may take up to a week depending on the day that iTunes checks for updates. You may manually obtain the update via the Check for Updates button within iTunes. After doing this, the update can be applied when your iPhone, iPod touch, or iPad is docked to your computer.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. The version after applying this update will be "5.1".
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin)
iQEcBAEBAgAGBQJPV6M3AAoJEGnF2JsdZQeef/cIAKBSn0czLzJO9fu6ZyjLRvxq 4pIZgfyEVGBzpn+9IeiGFTkkVf+bOsA+Q3RlcsG5g0RlbyFgnuWu59HHsnkrElbM bCfnnTF5eYZX/3fnLzxpX7BUsEona3nf1gHfR24OeEn36C8rZ6rZJfMLqCJNNZGY RDSga1oeMN/AbgZuR9sYKudkE0GOmkLZfR2G4WXmrU+JncR6XoROUwoJBPhg8z90 HAxgDEbduuLLOSe7CHLS3apbh0L2tmxPCWpiBmEMg6PTlFF0HhJQJ0wusrUc8nX6 7TDsAho73wCOpChzBGQeemc6+UEN2uDmUgwVkN6n4D/qN1u6E+d3coUXOlb8hIY= =qPeE -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201110-0410", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "chrome", "scope": "lt", "trust": 1.8, "vendor": "google", "version": "14.0.835.202" }, { "model": "safari", "scope": "lt", "trust": 1.8, "vendor": "apple", "version": "5.1.4" }, { "model": "itunes", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "10.6" }, { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "5.1" }, { "model": "chrome", "scope": "eq", "trust": 0.9, "vendor": "google", "version": "14.0.835.163" }, { "model": "chrome", "scope": "eq", "trust": 0.9, "vendor": "google", "version": "14.0.835.186" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7.3" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7.3" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "14.0.835.157" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "14.0.835.160" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "14.0.835.162" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "14.0.835.184" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "14.0.835.201" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "14.0.835.161" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "14.0.835.187" }, { "model": "chrome", "scope": "eq", "trust": 0.6, "vendor": "google", "version": "14.0.835.159" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.220" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.101" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.94" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.57" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.100" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.2.20" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.223" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.8" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0.1.8" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.303" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0" }, { "model": "itunes", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "10.6" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.20" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.43" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.300" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.203" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.105" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.10" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.211" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.18" }, { "model": "safari for windows", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5.1.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.221" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.104" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.213" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.306" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.102" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.307" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.208" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.128" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.2.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.19" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.301" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.2" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.15" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.6" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.205" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.16" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.6" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.10" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.17" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.204" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.222" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.215" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.127" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.65" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.225" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.21" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.107" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.302" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.219" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.310" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.5" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.218" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.103" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.217" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.224" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.112" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.71" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.5" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.100" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.13" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12.0.742.91" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.9" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.308" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "9.0.597.84" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.210" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.550.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.5" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.1" }, { "model": "ios beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.107" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "14" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.77" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.309" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.214" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.2.1" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.209" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.202" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.226" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.551.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.201" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.696.68" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11.0.672.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1.3" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10.5.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.5" }, { "model": "chrome", "scope": "ne", "trust": 0.3, "vendor": "google", "version": "14.0.835.202" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.7" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "12" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.549.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.304" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "11" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.112" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.207" }, { "model": "safari beta", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.212" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.305" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.3" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.216" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.237" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.344" }, { "model": "ipad", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "0" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.206" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.3" }, { "model": "safari", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "5.1.4" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.133" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.3" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.2" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "13.0.782.215" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "10.0.648.205" }, { "model": "chrome", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.200" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.3" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2.6" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.0.2" } ], "sources": [ { "db": "BID", "id": "49938" }, { "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "db": "CNNVD", "id": "CNNVD-201110-021" }, { "db": "NVD", "id": "CVE-2011-2877" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:google:chrome", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:safari", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002660" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "miaubiz, Sergey Glazunov, Google Chrome Security Team (Inferno), and Zhenyao Mo of the Chromium development community.", "sources": [ { "db": "BID", "id": "49938" } ], "trust": 0.3 }, "cve": "CVE-2011-2877", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2011-2877", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-50822", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-2877", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-2877", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201110-021", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-50822", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-50822" }, { "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "db": "CNNVD", "id": "CNNVD-201110-021" }, { "db": "NVD", "id": "CVE-2011-2877" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \"stale font.\". Google Chrome Used in Webkit Is SVG Insufficient operation of text due to improper handling of text (DoS) There are vulnerabilities that can be in a state or are otherwise unaffected. plural Apple Product Webkit A similar vulnerability exists for. Detail is Apple See vendor information for.Service disruption by a third party (DoS) You may be put into a state or affected by other details. Google Chrome is prone to multiple vulnerabilities. \nAttackers can exploit these issues to execute arbitrary code in the context of the browser, cause denial-of-service conditions, and bypass the same-origin policy; other attacks may also be possible. \nVersions prior to Chrome 14.0.835.202 are vulnerable. Google Chrome is a web browser developed by Google (Google). \nThese could be used in a malicious web site to direct the user to a\nspoofed site that visually appears to be a legitimate domain. This\nissue is addressed through an improved domain name validity check. \nThis issue does not affect OS X systems. \nCVE-ID\nCVE-2012-0640 : nshah\n\nWebKit\nAvailable for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,\nOS X Lion v10.7.3, OS X Lion Server v10.7.3, Windows 7, Vista,\nXP SP2 or later\nImpact: HTTP authentication credentials may be inadvertently\ndisclosed to another site\nDescription: If a site uses HTTP authentication and redirects to\nanother site, the authentication credentials may be sent to the other\nsite. ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nApple iOS Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA48288\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/48288/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48288\n\nRELEASE DATE:\n2012-03-09\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/48288/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/48288/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48288\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA weakness and multiple vulnerabilities have been reported in Apple\niOS, which can be exploited by malicious people with physical access\nto bypass certain security restrictions and by malicious people to\ndisclose sensitive information, conduct cross-site scripting attacks,\nbypass certain security restrictions, and compromise a user\u0027s device. \n\n1) An error within the CFNetwork component when handling URLs can be\nexploited to disclose sensitive information by tricking the user into\nvisiting a malicious website. \n\n3) A logic error within the kernel does not properly handle debug\nsystem calls and can be exploited to bypass the sandbox\nrestrictions. \n\n4) An integer overflow error within the libresolv library when\nhandling DNS resource records can be exploited to corrupt heap\nmemory. \n\n9) A cross-origin error in the WebKit component can be exploited to\nbypass the same-origin policy and disclose a cookie by tricking the\nuser into visiting a malicious website. \n\n10) An error within the WebKit component when handling drag-and-drop\nactions can be exploited to conduct cross-site scripting attacks. \n\n11) Multiple unspecified errors within the WebKit component can be\nexploited to conduct cross-site scripting attacks. \n\n12) Some vulnerabilities are caused due to a bundled vulnerable\nversion of WebKit. \n\nSOLUTION:\nApply iOS 5.1 Software Update. \n\nPROVIDED AND/OR DISCOVERED BY:\nThe vendor credits:\n1) Erling Ellingsen, Facebook. \n2, 8) pod2g. \n3) 2012 iOS Jailbreak Dream Team. \n5) Roland Kohler, the German Federal Ministry of Economics and\nTechnology. \n6) Eric Melville, American Express. \n9) Sergey Glazunov. \n\nORIGINAL ADVISORY:\nApple:\nhttp://support.apple.com/kb/HT5192\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2012-03-07-2 iOS 5.1 Software Update\n\niOS 5.1 Software Update is now available and addresses the following:\n\nCFNetwork\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of sensitive information\nDescription: An issue existed in CFNetwork\u0027s handling of malformed\nURLs. When accessing a maliciously crafted URL, CFNetwork could send\nunexpected request headers. \nCVE-ID\nCVE-2012-0641 : Erling Ellingsen of Facebook\n\nHFS\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Mounting a maliciously crafted disk image may lead to a\ndevice shutdown or arbitrary code execution\nDescription: An integer underflow existed with the handling of HFS\ncatalog files. \nCVE-ID\nCVE-2012-0642 : pod2g\n\nKernel\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: A malicious program could bypass sandbox restrictions\nDescription: A logic issue existed in the handling of debug system\ncalls. This may allow a malicious program to gain code execution in\nother programs with the same user privileges. \nCVE-ID\nCVE-2012-0643 : 2012 iOS Jailbreak Dream Team\n\nlibresolv\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Applications that use the libresolv library may be\nvulnerable to an unexpected application termination or arbitrary code\nexecution\nDescription: An integer overflow existed in the handling of DNS\nresource records, which may lead to heap memory corruption. \nCVE-ID\nCVE-2011-3453 : Ilja van Sprundel of IOActive\n\nPasscode Lock\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: A person with physical access to the device may be able to\nbypass the screen lock\nDescription: A race condition issue existed in the handling of slide\nto dial gestures. This may allow a person with physical access to the\ndevice to bypass the Passcode Lock screen. \nCVE-ID\nCVE-2012-0644 : Roland Kohler of the German Federal Ministry of\nEconomics and Technology\n\nSafari\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Web page visits may be recorded in browser history even when\nPrivate Browsing is active\nDescription: Safari\u0027s Private Browsing is designed to prevent\nrecording of a browsing session. Pages visited as a result of a site\nusing the JavaScript methods pushState or replaceState were recorded\nin the browser history even when Private Browsing mode was active. \nThis issue is addressed by not recording such visits when Private\nBrowsing is active. \nCVE-ID\nCVE-2012-0585 : Eric Melville of American Express\n\nSiri\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: An attacker with physical access to a locked phone could get\naccess to frontmost email message\nDescription: A design issue existed in Siri\u0027s lock screen\nrestrictions. If Siri was enabled for use on the lock screen, and\nMail was open with a message selected behind the lock screen, a voice\ncommand could be used to send that message to an arbitrary recipient. \nThis issue is addressed by disabling forwarding of active messages\nfrom the lock screen. \nCVE-ID\nCVE-2012-0645\n\nVPN\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: A maliciously crafted system configuration file may lead to\narbitrary code execution with system privileges\nDescription: A format string vulnerability existed in the handling\nof racoon configuration files. \nCVE-ID\nCVE-2012-0646 : pod2g\n\nWebKit\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Visiting a maliciously crafted website may lead to the\ndisclosure of cookies\nDescription: A cross-origin issue existed in WebKit, which may allow\ncookies to be disclosed across origins. \nCVE-ID\nCVE-2011-3887 : Sergey Glazunov\n\nWebKit\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Visiting a maliciously crafted website and dragging content\nwith the mouse may lead to a cross-site scripting attack\nDescription: A cross-origin issue existed in WebKit, which may allow\ncontent to be dragged and dropped across origins. \nCVE-ID\nCVE-2012-0590 : Adam Barth of Google Chrome Security Team\n\nWebKit\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Visiting a maliciously crafted website may lead to a cross-\nsite scripting attack\nDescription: Multiple cross-origin issues existed in WebKit. \nCVE-ID\nCVE-2011-3881 : Sergey Glazunov\nCVE-2012-0586 : Sergey Glazunov\nCVE-2012-0587 : Sergey Glazunov\nCVE-2012-0588 : Jochen Eisinger of Google Chrome Team\nCVE-2012-0589 : Alan Austin of polyvore.com\n\nWebKit\nAvailable for: iPhone 3GS, iPhone 4, iPhone 4S,\niPod touch (3rd generation) and later, iPad, iPad 2\nImpact: Visiting a maliciously crafted website may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in WebKit. \nCVE-ID\nCVE-2011-2825 : wushi of team509 working with TippingPoint\u0027s Zero Day\nInitiative\nCVE-2011-2833 : Apple\nCVE-2011-2846 : Arthur Gerkis, miaubiz\nCVE-2011-2847 : miaubiz, Abhishek Arya (Inferno) of Google Chrome\nSecurity Team using AddressSanitizer\nCVE-2011-2854 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2011-2855 : Arthur Gerkis, wushi of team509 working with iDefense\nVCP\nCVE-2011-2857 : miaubiz\nCVE-2011-2860 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2011-2867 : Dirk Schulze\nCVE-2011-2868 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2011-2869 : Cris Neckar of Google Chrome Security Team using\nAddressSanitizer\nCVE-2011-2870 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2011-2871 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2011-2872 : Abhishek Arya (Inferno) and Cris Neckar of Google\nChrome Security Team using AddressSanitizer\nCVE-2011-2873 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2011-2877 : miaubiz\nCVE-2011-3885 : miaubiz\nCVE-2011-3888 : miaubiz\nCVE-2011-3897 : pa_kt working with TippingPoint\u0027s Zero Day Initiative\nCVE-2011-3908 : Aki Helin of OUSPG\nCVE-2011-3909 : Google Chrome Security Team (scarybeasts) and Chu\nCVE-2011-3928 : wushi of team509 working with TippingPoint\u0027s Zero Day\nInitiative\nCVE-2012-0591 : miaubiz, and Martin Barbella\nCVE-2012-0592 : Alexander Gavrun working with TippingPoint\u0027s Zero Day\nInitiative\nCVE-2012-0593 : Lei Zhang of the Chromium development community\nCVE-2012-0594 : Adam Klein of the Chromium development community\nCVE-2012-0595 : Apple\nCVE-2012-0596 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0597 : miaubiz\nCVE-2012-0598 : Sergey Glazunov\nCVE-2012-0599 : Dmytro Gorbunov of SaveSources.com\nCVE-2012-0600 : Marshall Greenblatt, Dharani Govindan of Google\nChrome, miaubiz, Aki Helin of OUSPG, Apple\nCVE-2012-0601 : Apple\nCVE-2012-0602 : Apple\nCVE-2012-0603 : Apple\nCVE-2012-0604 : Apple\nCVE-2012-0605 : Apple\nCVE-2012-0606 : Apple\nCVE-2012-0607 : Apple\nCVE-2012-0608 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0609 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0610 : miaubiz, Martin Barbella using AddressSanitizer\nCVE-2012-0611 : Martin Barbella using AddressSanitizer\nCVE-2012-0612 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0613 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0614 : miaubiz, Martin Barbella using AddressSanitizer\nCVE-2012-0615 : Martin Barbella using AddressSanitizer\nCVE-2012-0616 : miaubiz\nCVE-2012-0617 : Martin Barbella using AddressSanitizer\nCVE-2012-0618 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0619 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0620 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0621 : Martin Barbella using AddressSanitizer\nCVE-2012-0622 : Dave Levin and Abhishek Arya of the Google Chrome\nSecurity Team\nCVE-2012-0623 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0624 : Martin Barbella using AddressSanitizer\nCVE-2012-0625 : Martin Barbella\nCVE-2012-0626 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam using AddressSanitizer\nCVE-2012-0627 : Apple\nCVE-2012-0628 : Slawomir Blazek, miaubiz, Abhishek Arya (Inferno) of\nGoogle Chrome Security Team using AddressSanitizer\nCVE-2012-0629 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam\nCVE-2012-0630 : Sergio Villar Senin of Igalia\nCVE-2012-0631 : Abhishek Arya (Inferno) of Google Chrome Security\nTeam\nCVE-2012-0632 : Cris Neckar of the Google Chrome Security Team using\nAddressSanitizer\nCVE-2012-0633 : Apple\nCVE-2012-0635 : Julien Chaffraix of the Chromium development\ncommunity, Martin Barbella using AddressSanitizer\n\n\nInstallation note:\n\nThis update is only available through iTunes, and will not appear\nin your computer\u0027s Software Update application, or in the Apple\nDownloads site. Make sure you have an Internet connection and have\ninstalled the latest version of iTunes from www.apple.com/itunes/\n\niTunes will automatically check Apple\u0027s update server on its weekly\nschedule. When an update is detected, it will download it. When\nthe iPhone, iPod touch or iPad is docked, iTunes will present the\nuser with the option to install the update. We recommend applying\nthe update immediately if possible. Selecting Don\u0027t Install will\npresent the option the next time you connect your iPhone, iPod touch,\nor iPad. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes checks for updates. You may manually obtain the\nupdate via the Check for Updates button within iTunes. After doing\nthis, the update can be applied when your iPhone, iPod touch, or iPad\nis docked to your computer. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update will be \"5.1\". \n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.16 (Darwin)\n\niQEcBAEBAgAGBQJPV6M3AAoJEGnF2JsdZQeef/cIAKBSn0czLzJO9fu6ZyjLRvxq\n4pIZgfyEVGBzpn+9IeiGFTkkVf+bOsA+Q3RlcsG5g0RlbyFgnuWu59HHsnkrElbM\nbCfnnTF5eYZX/3fnLzxpX7BUsEona3nf1gHfR24OeEn36C8rZ6rZJfMLqCJNNZGY\nRDSga1oeMN/AbgZuR9sYKudkE0GOmkLZfR2G4WXmrU+JncR6XoROUwoJBPhg8z90\nHAxgDEbduuLLOSe7CHLS3apbh0L2tmxPCWpiBmEMg6PTlFF0HhJQJ0wusrUc8nX6\n7TDsAho73wCOpChzBGQeemc6+UEN2uDmUgwVkN6n4D/qN1u6E+d3coUXOlb8hIY=\n=qPeE\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2011-2877" }, { "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "db": "BID", "id": "49938" }, { "db": "VULHUB", "id": "VHN-50822" }, { "db": "PACKETSTORM", "id": "110644" }, { "db": "PACKETSTORM", "id": "110716" }, { "db": "PACKETSTORM", "id": "110650" }, { "db": "PACKETSTORM", "id": "110590" }, { "db": "PACKETSTORM", "id": "110591" }, { "db": "PACKETSTORM", "id": "110779" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-2877", "trust": 3.1 }, { "db": "SECUNIA", "id": "48377", "trust": 1.8 }, { "db": "SECUNIA", "id": "48274", "trust": 1.8 }, { "db": "SECUNIA", "id": "48288", "trust": 1.8 }, { "db": "SECTRACK", "id": "1026774", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2011-002660", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201110-021", "trust": 0.7 }, { "db": "BID", "id": "49938", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-50822", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110644", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110716", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110650", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110590", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110591", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110779", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-50822" }, { "db": "BID", "id": "49938" }, { "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "db": "PACKETSTORM", "id": "110644" }, { "db": "PACKETSTORM", "id": "110716" }, { "db": "PACKETSTORM", "id": "110650" }, { "db": "PACKETSTORM", "id": "110590" }, { "db": "PACKETSTORM", "id": "110591" }, { "db": "PACKETSTORM", "id": "110779" }, { "db": "CNNVD", "id": "CNNVD-201110-021" }, { "db": "NVD", "id": "CVE-2011-2877" } ] }, "id": "VAR-201110-0410", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-50822" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:59:14.033000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT5190", "trust": 0.8, "url": "http://support.apple.com/kb/HT5190" }, { "title": "Google Chrome", "trust": 0.8, "url": "http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja\u0026hl=ja" }, { "title": "stable-channel-update", "trust": 0.8, "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "title": "Google Chrome SVG Repair measures for text input verification error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=118067" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "db": "CNNVD", "id": "CNNVD-201110-021" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-50822" }, { "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "db": "NVD", "id": "CVE-2011-2877" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2012/mar/msg00000.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2012/mar/msg00001.html" }, { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2012/mar/msg00003.html" }, { "trust": 1.7, "url": "http://code.google.com/p/chromium/issues/detail?id=95072" }, { "trust": 1.7, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14694" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id?1026774" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48274" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48288" }, { "trust": 1.7, "url": "http://secunia.com/advisories/48377" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2877" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu428075/" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2877" }, { "trust": 0.3, "url": "http://www.google.com/chrome" }, { "trust": 0.3, "url": "http://secunia.com/psi_30_beta_launch" }, { "trust": 0.3, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.3, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.3, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.3, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.3, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2867" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3888" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2872" }, { "trust": 0.3, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2877" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2871" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2869" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2860" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3885" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2873" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2870" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2847" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2868" }, { "trust": 0.3, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2855" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2857" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3897" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2825" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2854" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3908" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3909" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2833" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2846" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3887" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0585" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3928" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0586" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3881" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2866" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht5191" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48274" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48274/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48274/#comments" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0584" }, { "trust": 0.1, "url": "http://www.apple.com/safari/download/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48288/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48288" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48288/" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht5192" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0592" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0595" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0596" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0594" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0591" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0593" }, { "trust": 0.1, "url": "http://www.apple.com/itunes/download/" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3453" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0587" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht5190" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48377/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/48377/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=48377" } ], "sources": [ { "db": "VULHUB", "id": "VHN-50822" }, { "db": "BID", "id": "49938" }, { "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "db": "PACKETSTORM", "id": "110644" }, { "db": "PACKETSTORM", "id": "110716" }, { "db": "PACKETSTORM", "id": "110650" }, { "db": "PACKETSTORM", "id": "110590" }, { "db": "PACKETSTORM", "id": "110591" }, { "db": "PACKETSTORM", "id": "110779" }, { "db": "CNNVD", "id": "CNNVD-201110-021" }, { "db": "NVD", "id": "CVE-2011-2877" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-50822" }, { "db": "BID", "id": "49938" }, { "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "db": "PACKETSTORM", "id": "110644" }, { "db": "PACKETSTORM", "id": "110716" }, { "db": "PACKETSTORM", "id": "110650" }, { "db": "PACKETSTORM", "id": "110590" }, { "db": "PACKETSTORM", "id": "110591" }, { "db": "PACKETSTORM", "id": "110779" }, { "db": "CNNVD", "id": "CNNVD-201110-021" }, { "db": "NVD", "id": "CVE-2011-2877" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-10-04T00:00:00", "db": "VULHUB", "id": "VHN-50822" }, { "date": "2011-10-04T00:00:00", "db": "BID", "id": "49938" }, { "date": "2011-11-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "date": "2012-03-11T05:31:55", "db": "PACKETSTORM", "id": "110644" }, { "date": "2012-03-13T00:58:40", "db": "PACKETSTORM", "id": "110716" }, { "date": "2012-03-11T05:32:13", "db": "PACKETSTORM", "id": "110650" }, { "date": "2012-03-08T22:22:22", "db": "PACKETSTORM", "id": "110590" }, { "date": "2012-03-08T22:23:23", "db": "PACKETSTORM", "id": "110591" }, { "date": "2012-03-14T05:16:27", "db": "PACKETSTORM", "id": "110779" }, { "date": "2011-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-021" }, { "date": "2011-10-04T20:55:01.567000", "db": "NVD", "id": "CVE-2011-2877" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-05-08T00:00:00", "db": "VULHUB", "id": "VHN-50822" }, { "date": "2012-03-12T19:50:00", "db": "BID", "id": "49938" }, { "date": "2012-03-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002660" }, { "date": "2020-05-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201110-021" }, { "date": "2024-11-21T01:29:10.893000", "db": "NVD", "id": "CVE-2011-2877" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201110-021" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Used in multiple products Webkit Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002660" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-201110-021" } ], "trust": 0.6 } }
fkie_cve-2011-2877
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
chrome-cve-admin@google.com | http://code.google.com/p/chromium/issues/detail?id=95072 | ||
chrome-cve-admin@google.com | http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html | ||
chrome-cve-admin@google.com | http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html | ||
chrome-cve-admin@google.com | http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html | ||
chrome-cve-admin@google.com | http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html | ||
chrome-cve-admin@google.com | http://secunia.com/advisories/48274 | ||
chrome-cve-admin@google.com | http://secunia.com/advisories/48288 | ||
chrome-cve-admin@google.com | http://secunia.com/advisories/48377 | ||
chrome-cve-admin@google.com | http://www.securitytracker.com/id?1026774 | ||
chrome-cve-admin@google.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://code.google.com/p/chromium/issues/detail?id=95072 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48274 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48288 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/48377 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1026774 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB9CA493-603C-4543-B2FB-322C98504C6C", "versionEndExcluding": "14.0.835.202", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA2DCF16-0EEA-40BD-9855-CC08F58A2CEF", "versionEndExcluding": "10.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DE4C7C6-8958-4FF7-9338-D59D325E29FC", "versionEndExcluding": "5.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B150860-FC76-4DDC-9FEE-BC5D96D08751", "versionEndExcluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Google Chrome before 14.0.835.202 does not properly handle SVG text, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to \"stale font.\"" }, { "lang": "es", "value": "Google Chrome antes de v14.0.835.202 no controla correctamente el texto SVG, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio o posiblemente tener un impacto no especificado a trav\u00e9s de vectores desconocidos que conducen a una fuente de letra bloqueada." } ], "id": "CVE-2011-2877", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-10-04T20:55:01.567", "references": [ { "source": "chrome-cve-admin@google.com", "url": "http://code.google.com/p/chromium/issues/detail?id=95072" }, { "source": "chrome-cve-admin@google.com", "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/48274" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/48288" }, { "source": "chrome-cve-admin@google.com", "url": "http://secunia.com/advisories/48377" }, { "source": "chrome-cve-admin@google.com", "url": "http://www.securitytracker.com/id?1026774" }, { "source": "chrome-cve-admin@google.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://code.google.com/p/chromium/issues/detail?id=95072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://googlechromereleases.blogspot.com/2011/10/stable-channel-update.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1026774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14694" } ], "sourceIdentifier": "chrome-cve-admin@google.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.