var-201007-0330
Vulnerability from variot
The AutoFill feature in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to obtain sensitive Address Book Card information via JavaScript code that forces keystroke events for input fields. Safari is prone to multiple security vulnerabilities that have been addressed in Apple security advisory APPLE-SA-2010-07-28-1. Attackers can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage. Successful attacks may result in information disclosure, remote code execution, denial of service, or other consequences. This BID is being retired. The following individual records exist to better document these issues: 41884 Apple Safari Personal Address Book AutoFill Information Disclosure Weakness 42034 WebKit Inline Elements Remote Memory Corruption Vulnerability 42035 WebKit CVE-2010-1783 Remote Memory Corruption Vulnerability 42036 WebKit CSS Counters Remote Memory Corruption Vulnerability 42037 WebKit ':first-letter' and ':first-line' Pseudo-Elements Remote Memory Corruption Vulnerability 42038 WebKit CVE-2010-1787 Floating Elements Remote Memory Corruption Vulnerability 42039 Apple Safari RSS Feed Information Disclosure Vulnerability 42041 WebKit 'use' Element Handling Remote Memory Corruption Vulnerability 42042 WebKit Regular Expression Handling Remote Memory Corruption Vulnerability 42043 WebKit Just-In-Time Compiled JavaScript Stubs Remote Code Execution Vulnerability 42044 WebKit Element Focus Use-After-Free Remote Code Execution Vulnerability 42045 WebKit JavaScript Array Signedness Error Remote Code Execution Vulnerability 42046 WebKit 'foreignObject' Elements Use-After-Free Remote Code Execution Vulnerability 42048 WebKit JavaScript String Object Remote Heap Based Buffer Overflow Vulnerability 42049 WebKit 'font-face' and 'use' Elements Use-After-Free Remote Code Execution Vulnerability. A remote attacker can exploit this issue to obtain sensitive information that may aid in further attacks. Safari 5.0 is vulnerable; other versions may also be affected
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201007-0330", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "safari", "scope": "eq", "trust": 2.2, "vendor": "apple", "version": "4.0.5" }, { "model": "safari", "scope": "eq", "trust": 2.2, "vendor": "apple", "version": "4.0.4" }, { "model": "safari", "scope": "eq", "trust": 2.2, "vendor": "apple", "version": "4.0.3" }, { "model": "safari", "scope": "eq", "trust": 2.2, "vendor": "apple", "version": "4.0.2" }, { "model": "safari", "scope": "eq", "trust": 2.2, "vendor": "apple", "version": "4.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.0.0b" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.0" }, { "model": "safari", "scope": "eq", "trust": 1.4, "vendor": "apple", "version": "4" }, { "model": "safari", "scope": "eq", "trust": 1.2, "vendor": "apple", "version": "4.1" }, { "model": "safari", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "5.0" }, { "model": "webkit", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "*" }, { "model": "safari", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "4.1" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.11" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.11" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "safari", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "5" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.0.5" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.0.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.0.3" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.0.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "5.0" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "5.0" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4" }, { "model": "safari beta", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4" }, { "model": "safari", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "5.0.1" }, { "model": "safari", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "4.1.1" }, { "model": "webkit", "scope": null, "trust": 0.6, "vendor": "apple", "version": null } ], "sources": [ { "db": "BID", "id": "42020" }, { "db": "BID", "id": "41884" }, { "db": "JVNDB", "id": "JVNDB-2010-001846" }, { "db": "CNNVD", "id": "CNNVD-201007-327" }, { "db": "NVD", "id": "CVE-2010-1796" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:safari", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001846" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Jeremiah Grossman", "sources": [ { "db": "BID", "id": "41884" }, { "db": "CNNVD", "id": "CNNVD-201007-327" } ], "trust": 0.9 }, "cve": "CVE-2010-1796", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "CVE-2010-1796", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.8, "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 4.9, "id": "VHN-44401", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:N/AC:H/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-1796", "trust": 1.0, "value": "LOW" }, { "author": "NVD", "id": "CVE-2010-1796", "trust": 0.8, "value": "Low" }, { "author": "CNNVD", "id": "CNNVD-201007-327", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-44401", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-44401" }, { "db": "JVNDB", "id": "JVNDB-2010-001846" }, { "db": "CNNVD", "id": "CNNVD-201007-327" }, { "db": "NVD", "id": "CVE-2010-1796" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AutoFill feature in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to obtain sensitive Address Book Card information via JavaScript code that forces keystroke events for input fields. Safari is prone to multiple security vulnerabilities that have been addressed in Apple security advisory APPLE-SA-2010-07-28-1. \nAttackers can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage. Successful attacks may result in information disclosure, remote code execution, denial of service, or other consequences. \nThis BID is being retired. The following individual records exist to better document these issues:\n41884 Apple Safari Personal Address Book AutoFill Information Disclosure Weakness\n42034 WebKit Inline Elements Remote Memory Corruption Vulnerability\n42035 WebKit CVE-2010-1783 Remote Memory Corruption Vulnerability\n42036 WebKit CSS Counters Remote Memory Corruption Vulnerability\n42037 WebKit \u0027:first-letter\u0027 and \u0027:first-line\u0027 Pseudo-Elements Remote Memory Corruption Vulnerability\n42038 WebKit CVE-2010-1787 Floating Elements Remote Memory Corruption Vulnerability\n42039 Apple Safari RSS Feed Information Disclosure Vulnerability\n42041 WebKit \u0027use\u0027 Element Handling Remote Memory Corruption Vulnerability\n42042 WebKit Regular Expression Handling Remote Memory Corruption Vulnerability\n42043 WebKit Just-In-Time Compiled JavaScript Stubs Remote Code Execution Vulnerability\n42044 WebKit Element Focus Use-After-Free Remote Code Execution Vulnerability\n42045 WebKit JavaScript Array Signedness Error Remote Code Execution Vulnerability\n42046 WebKit \u0027foreignObject\u0027 Elements Use-After-Free Remote Code Execution Vulnerability\n42048 WebKit JavaScript String Object Remote Heap Based Buffer Overflow Vulnerability\n42049 WebKit \u0027font-face\u0027 and \u0027use\u0027 Elements Use-After-Free Remote Code Execution Vulnerability. \nA remote attacker can exploit this issue to obtain sensitive information that may aid in further attacks. \nSafari 5.0 is vulnerable; other versions may also be affected", "sources": [ { "db": "NVD", "id": "CVE-2010-1796" }, { "db": "JVNDB", "id": "JVNDB-2010-001846" }, { "db": "BID", "id": "42020" }, { "db": "BID", "id": "41884" }, { "db": "VULHUB", "id": "VHN-44401" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-1796", "trust": 2.8 }, { "db": "BID", "id": "42020", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2010-001846", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201007-327", "trust": 0.7 }, { "db": "NSFOCUS", "id": "15474", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2010-07-28-1", "trust": 0.6 }, { "db": "BID", "id": "41884", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-44401", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-44401" }, { "db": "BID", "id": "42020" }, { "db": "BID", "id": "41884" }, { "db": "JVNDB", "id": "JVNDB-2010-001846" }, { "db": "CNNVD", "id": "CNNVD-201007-327" }, { "db": "NVD", "id": "CVE-2010-1796" } ] }, "id": "VAR-201007-0330", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-44401" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T21:08:31.184000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4276", "trust": 0.8, "url": "http://support.apple.com/kb/HT4276" }, { "title": "HT4276", "trust": 0.8, "url": "http://support.apple.com/kb/HT4276?viewlocale=ja_JP" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001846" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-44401" }, { "db": "JVNDB", "id": "JVNDB-2010-001846" }, { "db": "NVD", "id": "CVE-2010-1796" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://lists.apple.com/archives/security-announce/2010//jul/msg00001.html" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/42020" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht4276" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11112" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1796" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu568637" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1796" }, { "trust": 0.6, "url": "http://www.apple.com/safari/" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/15474" }, { "trust": 0.3, "url": "http://jeremiahgrossman.blogspot.com/2010/07/i-know-who-your-name-where-you-work-and.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-44401" }, { "db": "BID", "id": "42020" }, { "db": "BID", "id": "41884" }, { "db": "JVNDB", "id": "JVNDB-2010-001846" }, { "db": "CNNVD", "id": "CNNVD-201007-327" }, { "db": "NVD", "id": "CVE-2010-1796" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-44401" }, { "db": "BID", "id": "42020" }, { "db": "BID", "id": "41884" }, { "db": "JVNDB", "id": "JVNDB-2010-001846" }, { "db": "CNNVD", "id": "CNNVD-201007-327" }, { "db": "NVD", "id": "CVE-2010-1796" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-07-30T00:00:00", "db": "VULHUB", "id": "VHN-44401" }, { "date": "2010-07-28T00:00:00", "db": "BID", "id": "42020" }, { "date": "2010-07-22T00:00:00", "db": "BID", "id": "41884" }, { "date": "2010-08-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001846" }, { "date": "2010-07-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201007-327" }, { "date": "2010-07-30T20:30:02.333000", "db": "NVD", "id": "CVE-2010-1796" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-19T00:00:00", "db": "VULHUB", "id": "VHN-44401" }, { "date": "2010-07-28T20:25:00", "db": "BID", "id": "42020" }, { "date": "2010-07-28T16:45:00", "db": "BID", "id": "41884" }, { "date": "2010-08-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001846" }, { "date": "2010-08-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201007-327" }, { "date": "2024-11-21T01:15:13.050000", "db": "NVD", "id": "CVE-2010-1796" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "42020" }, { "db": "BID", "id": "41884" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Safari of AutoFill Vulnerability in obtaining address book card information in functions", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001846" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201007-327" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.