var-200909-0745
Vulnerability from variot

Launch Services in Apple Mac OS X 10.5.8 does not properly recognize an unsafe Uniform Type Identifier (UTI) in an exported document type in a downloaded application, which allows remote attackers to trigger the automatic opening of a file, and execute arbitrary code, via a crafted web site. Apple Mac OS X is prone to a remote code-execution vulnerability that affects the Launch Services component. Successful exploits may allow attackers to execute arbitrary code with the privileges of the currently logged-in user. The following versions are affected: Mac OS X 10.5.8 and prior Mac OS X Server 10.5.8 and prior NOTE: This issue was previously covered in BID 36349 (Apple Mac OS X 2009-005 Multiple Security Vulnerabilities), but has been assigned its own record to better document it. Visiting a malicious website may cause unsafe file types to open automatically. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

1) An error in Alias Manager when processing alias files can be exploited to cause a buffer overflow and potentially execute arbitrary code.

2) An error in Resource Manager when processing resource forks can be exploited to corrupt memory and potentially execute arbitrary code.

3) Multiple vulnerabilities in ClamAV can be exploited to bypass certain security restrictions, cause a DoS, and potentially compromise a vulnerable system.

For more information: SA34566 SA34612

4) An integer overflow error exists when processing ColorSync profiles embedded in images. This can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code via a specially crafted image.

5) An integer overflow error exists in CoreGraphics when processing JBIG2 streams embedded in PDF files. This can be exploited to cause a heap-based buffer overflow and potentially execute arbitrary code via a specially crafted PDF file.

6) An error in CoreGraphics can be exploited to cause a heap-based buffer overflow potentially execute arbitrary code when drawing long text strings.

This is related to vulnerability #1 in: SA36269

7) A NULL-pointer dereference error in CUPS can be exploited to cause a crash.

For more information see vulnerability #4 in: SA34481

8) An error in the CUPS USB backend can be exploited to cause a heap-based buffer overflow and execute arbitrary code with escalated privileges.

9) Multiple vulnerabilities in Adobe Flash Player can be exploited by malicious people to bypass security features, gain knowledge of sensitive information, or compromise a user's system.

For more information: SA35948

10) Multiple errors exist in ImageIO when processing PixarFilm encoded TIFF images. These can be exploited to trigger memory corruptions and potentially execute arbitrary code via specially crafted TIFF files.

11) An error exists in Launch Services when handling files having a ".fileloc" extension.

12) An error exists in Launch Services when handling exported document types presented when an application is downloaded.

13) An error in MySQL can be exploited by malicious, local users to bypass certain security restrictions.

For more information: SA30134

14) Multiple vulnerabilities in PHP have an unknown impact or can potentially be exploited by malicious people to disclose sensitive information or cause a DoS (Denial of Service).

For more information: SA34081

15) An error exists in Samba when handling error conditions. This can be exploited by a user without a configured home directory to access the contents of the file system by connecting to the Windows File Sharing service.

16) Input passed in search requests containing non UTF-8 encoded data to Wiki Server is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Security Update 2009-005 (Tiger PPC): http://support.apple.com/downloads/DL931/en_US/SecUpd2009-005PPC.dmg

Security Update 2009-005 (Tiger Intel): http://support.apple.com/downloads/DL932/en_US/SecUpd2009-005Intel.dmg

Security Update 2009-005 Server (Tiger Univ): http://support.apple.com/downloads/DL933/en_US/SecUpdSrvr2009-005Univ.dmg

Security Update 2009-005 Server (Tiger PPC): http://support.apple.com/downloads/DL934/en_US/SecUpdSrvr2009-005PPC.dmg

Mac OS X Server v10.6.1 Update: http://support.apple.com/downloads/DL929/en_US/MacOSXServerUpd10.6.1.dmg

Security Update 2009-005 Server (Leopard): http://support.apple.com/downloads/DL936/en_US/SecUpdSrvr2009-005.dmg

Security Update 2009-005 (Leopard): http://support.apple.com/downloads/DL935/en_US/SecUpd2009-005.dmg

Mac OS X v10.6.1 Update: http://support.apple.com/downloads/DL930/en_US/MacOSXUpd10.6.1.dmg

PROVIDED AND/OR DISCOVERED BY: 1, 2, 4, 8, 10-12, 16) Reported by the vendor. 5) The vendor credits Will Dormann of CERT/CC. 6) The vendor credits Will Drewry of Google. 15) The vendor credits J. David Hester of LCG Systems National Institutes of Health.

ORIGINAL ADVISORY: http://support.apple.com/kb/HT3864 http://support.apple.com/kb/HT3865

OTHER REFERENCES: SA30134: http://secunia.com/advisories/30134/

SA34081: http://secunia.com/advisories/34081/

SA34481: http://secunia.com/advisories/34481/

SA34566: http://secunia.com/advisories/34566/

SA34612: http://secunia.com/advisories/34612/

SA35948: http://secunia.com/advisories/35948/

SA36269: http://secunia.com/advisories/36269/


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200909-0745",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.8"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "apple",
        "version": "10.5.8"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5.8"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "apple",
        "version": "v10.5.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.8"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.8"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.7"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.5"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "36361"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2812"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:apple:mac_os_x_server",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "J. David Hester",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2009-2812",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2009-2812",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.8,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-40258",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-2812",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-2812",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200909-280",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-40258",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40258"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2812"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Launch Services in Apple Mac OS X 10.5.8 does not properly recognize an unsafe Uniform Type Identifier (UTI) in an exported document type in a downloaded application, which allows remote attackers to trigger the automatic opening of a file, and execute arbitrary code, via a crafted web site. Apple Mac OS X is prone to a remote code-execution vulnerability that affects the Launch Services component. \nSuccessful exploits may allow attackers to execute arbitrary code with the privileges of the currently logged-in user. \nThe following versions are affected:\nMac OS X 10.5.8 and prior\nMac OS X Server 10.5.8 and prior\nNOTE: This issue was previously covered in BID 36349 (Apple Mac OS X 2009-005 Multiple Security Vulnerabilities),  but has been assigned its own record to better document it. Visiting a malicious website may cause unsafe file types to open automatically. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\n1) An error in Alias Manager when processing alias files can be\nexploited to cause a buffer overflow and potentially execute\narbitrary code. \n\n2) An error in Resource Manager when processing resource forks can be\nexploited to corrupt memory and potentially execute arbitrary code. \n\n3) Multiple vulnerabilities in ClamAV can be exploited to bypass\ncertain security restrictions, cause a DoS, and potentially\ncompromise a vulnerable system. \n\nFor more information:\nSA34566\nSA34612\n\n4) An integer overflow error exists when processing ColorSync\nprofiles embedded in images. This can be exploited to cause a\nheap-based buffer overflow and potentially execute arbitrary code via\na specially crafted image. \n\n5) An integer overflow error exists in CoreGraphics when processing\nJBIG2 streams embedded in PDF files. This can be exploited to cause a\nheap-based buffer overflow and potentially execute arbitrary code via\na specially crafted PDF file. \n\n6) An error in CoreGraphics can be exploited to cause a heap-based\nbuffer overflow potentially execute arbitrary code when drawing long\ntext strings. \n\nThis is related to vulnerability #1 in:\nSA36269\n\n7) A NULL-pointer dereference error in CUPS can be exploited to cause\na crash. \n\nFor more information see vulnerability #4 in:\nSA34481\n\n8) An error in the CUPS USB backend can be exploited to cause a\nheap-based buffer overflow and execute arbitrary code with escalated\nprivileges. \n\n9) Multiple vulnerabilities in Adobe Flash Player can be exploited by\nmalicious people to bypass security features, gain knowledge of\nsensitive information, or compromise a user\u0027s system. \n\nFor more information:\nSA35948\n\n10) Multiple errors exist in ImageIO when processing PixarFilm\nencoded TIFF images. These can be exploited to trigger memory\ncorruptions and potentially execute arbitrary code via specially\ncrafted TIFF files. \n\n11) An error exists in Launch Services when handling files having a\n\".fileloc\" extension. \n\n12) An error exists in Launch Services when handling exported\ndocument types presented when an application is downloaded. \n\n13) An error in MySQL can be exploited by malicious, local users to\nbypass certain security restrictions. \n\nFor more information:\nSA30134\n\n14) Multiple vulnerabilities in PHP have an unknown impact or can\npotentially be exploited by malicious people to disclose sensitive\ninformation or cause a DoS (Denial of Service). \n\nFor more information:\nSA34081\n\n15) An error exists in Samba when handling error conditions. This can\nbe exploited by a user without a configured home directory to access\nthe contents of the file system by connecting to the Windows File\nSharing service. \n\n16) Input passed in search requests containing non UTF-8 encoded data\nto Wiki Server is not properly sanitised before being returned to the\nuser. This can be exploited to execute arbitrary HTML and script code\nin a user\u0027s browser session in context of an affected site. \n\nSecurity Update 2009-005 (Tiger PPC):\nhttp://support.apple.com/downloads/DL931/en_US/SecUpd2009-005PPC.dmg\n\nSecurity Update 2009-005 (Tiger Intel):\nhttp://support.apple.com/downloads/DL932/en_US/SecUpd2009-005Intel.dmg\n\nSecurity Update 2009-005 Server (Tiger Univ):\nhttp://support.apple.com/downloads/DL933/en_US/SecUpdSrvr2009-005Univ.dmg\n\nSecurity Update 2009-005 Server (Tiger PPC):\nhttp://support.apple.com/downloads/DL934/en_US/SecUpdSrvr2009-005PPC.dmg\n\nMac OS X Server v10.6.1 Update:\nhttp://support.apple.com/downloads/DL929/en_US/MacOSXServerUpd10.6.1.dmg\n\nSecurity Update 2009-005 Server (Leopard):\nhttp://support.apple.com/downloads/DL936/en_US/SecUpdSrvr2009-005.dmg\n\nSecurity Update 2009-005 (Leopard):\nhttp://support.apple.com/downloads/DL935/en_US/SecUpd2009-005.dmg\n\nMac OS X v10.6.1 Update:\nhttp://support.apple.com/downloads/DL930/en_US/MacOSXUpd10.6.1.dmg\n\nPROVIDED AND/OR DISCOVERED BY:\n1, 2, 4, 8, 10-12, 16) Reported by the vendor. \n5) The vendor credits Will Dormann of CERT/CC. \n6) The vendor credits Will Drewry of Google. \n15) The vendor credits J. David Hester of LCG Systems National\nInstitutes of Health. \n\nORIGINAL ADVISORY:\nhttp://support.apple.com/kb/HT3864\nhttp://support.apple.com/kb/HT3865\n\nOTHER REFERENCES:\nSA30134:\nhttp://secunia.com/advisories/30134/\n\nSA34081:\nhttp://secunia.com/advisories/34081/\n\nSA34481:\nhttp://secunia.com/advisories/34481/\n\nSA34566:\nhttp://secunia.com/advisories/34566/\n\nSA34612:\nhttp://secunia.com/advisories/34612/\n\nSA35948:\nhttp://secunia.com/advisories/35948/\n\nSA36269:\nhttp://secunia.com/advisories/36269/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-2812"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      },
      {
        "db": "BID",
        "id": "36361"
      },
      {
        "db": "VULHUB",
        "id": "VHN-40258"
      },
      {
        "db": "PACKETSTORM",
        "id": "81208"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-2812",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "36701",
        "trust": 2.6
      },
      {
        "db": "BID",
        "id": "36361",
        "trust": 1.4
      },
      {
        "db": "OSVDB",
        "id": "57954",
        "trust": 1.1
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200909-280",
        "trust": 0.7
      },
      {
        "db": "APPLE",
        "id": "APPLE-SA-2009-09-10-2",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-40258",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "81208",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40258"
      },
      {
        "db": "BID",
        "id": "36361"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      },
      {
        "db": "PACKETSTORM",
        "id": "81208"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2812"
      }
    ]
  },
  "id": "VAR-200909-0745",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40258"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T20:09:03.289000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HT3865",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT3865"
      },
      {
        "title": "HT3865",
        "trust": 0.8,
        "url": "http://support.apple.com/kb/HT3865?viewlocale=ja_JP"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-DesignError",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2812"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/36701"
      },
      {
        "trust": 1.8,
        "url": "http://support.apple.com/kb/ht3865"
      },
      {
        "trust": 1.7,
        "url": "http://lists.apple.com/archives/security-announce/2009/sep/msg00004.html"
      },
      {
        "trust": 1.1,
        "url": "http://www.securityfocus.com/bid/36361"
      },
      {
        "trust": 1.1,
        "url": "http://osvdb.org/57954"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2812"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2812"
      },
      {
        "trust": 0.3,
        "url": "http://www.apple.com/macosx/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/35948/"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/downloads/dl936/en_us/secupdsrvr2009-005.dmg"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/downloads/dl933/en_us/secupdsrvr2009-005univ.dmg"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34481/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/downloads/dl932/en_us/secupd2009-005intel.dmg"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/36269/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/kb/ht3864"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/downloads/dl930/en_us/macosxupd10.6.1.dmg"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34566/"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/downloads/dl935/en_us/secupd2009-005.dmg"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/36701/"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/downloads/dl934/en_us/secupdsrvr2009-005ppc.dmg"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/downloads/dl931/en_us/secupd2009-005ppc.dmg"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34081/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/34612/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/30134/"
      },
      {
        "trust": 0.1,
        "url": "http://support.apple.com/downloads/dl929/en_us/macosxserverupd10.6.1.dmg"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40258"
      },
      {
        "db": "BID",
        "id": "36361"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      },
      {
        "db": "PACKETSTORM",
        "id": "81208"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2812"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-40258"
      },
      {
        "db": "BID",
        "id": "36361"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      },
      {
        "db": "PACKETSTORM",
        "id": "81208"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-2812"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-09-14T00:00:00",
        "db": "VULHUB",
        "id": "VHN-40258"
      },
      {
        "date": "2009-09-10T00:00:00",
        "db": "BID",
        "id": "36361"
      },
      {
        "date": "2009-10-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      },
      {
        "date": "2009-09-11T14:30:33",
        "db": "PACKETSTORM",
        "id": "81208"
      },
      {
        "date": "2009-09-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      },
      {
        "date": "2009-09-14T16:30:00.420000",
        "db": "NVD",
        "id": "CVE-2009-2812"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-10-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-40258"
      },
      {
        "date": "2009-09-11T16:32:00",
        "db": "BID",
        "id": "36361"
      },
      {
        "date": "2009-10-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      },
      {
        "date": "2009-09-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      },
      {
        "date": "2024-11-21T01:05:47.683000",
        "db": "NVD",
        "id": "CVE-2009-2812"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Apple Mac OS of  Launch Services Vulnerable to arbitrary code execution",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002137"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Design Error",
    "sources": [
      {
        "db": "BID",
        "id": "36361"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200909-280"
      }
    ],
    "trust": 0.9
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…