var-201209-0341
Vulnerability from variot
WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1. WebKit is prone to multiple unspecified memory-corruption vulnerabilities. An attacker can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage with a vulnerable application. Few technical details are currently available. We will update this BID when more information emerges. Successful exploits will allow attackers to execute arbitrary code in the context of the affected browser or cause denial-of-service conditions; other attacks may also be possible. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
APPLE-SA-2012-09-19-3 Safari 6.0.1
Safari 6.0.1 is now available and addresses the following:
Safari Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 and v10.8.1 Impact: Opening a maliciously crafted downloaded HTML document may lead to the disclosure of local file content Description: In OS X Mountain Lion HTML files were removed from the unsafe type list. Quarantined HTML documents are opened in a safe mode that prevents accessing other local or remote resources. A logic error in Safari's handling of the Quarantine attribute caused the safe mode not to be triggered on Quarantined files. This issue was addressed by properly detecting the existence of the Quarantine attribute. CVE-ID CVE-2012-3713 : Aaron Sigel of vtty.com, Masahiro Yamada
Safari Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 and v10.8.1 Impact: Using Autofill on a maliciously crafted website may lead to the disclosure of contact information Description: A rare condition existed in the handling of Form Autofill. Using Form Autofill on a maliciously crafted website may have led to disclosure of information from the Address Book "Me" card that was not included in the Autofill popover. This issue was addressed by limiting Autofill to the fields contained in the popover. CVE-ID CVE-2012-3714 : Jonathan Hogervorst of Buzzera
Safari Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 and v10.8.1 Impact: After editing a HTTPS URL in the address bar, a request may be unexpectedly sent over HTTP Description: A logic issue existed in the handling of HTTPS URLs in the address bar. If a portion of the address was edited by pasting text, the request may be unexpectedly sent over HTTP. This issue was addressed by improved handling of HTTPS URLs. CVE-ID CVE-2012-3715 : Aaron Rhoads of East Watch Services LLC, Pepi Zawodsky
WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8 and v10.8.1 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2011-3105 : miaubiz CVE-2012-2817 : miaubiz CVE-2012-2818 : miaubiz CVE-2012-2829 : miaubiz CVE-2012-2831 : miaubiz CVE-2012-2842 : miaubiz CVE-2012-2843 : miaubiz CVE-2012-3598 : Apple Product Security CVE-2012-3601 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer CVE-2012-3602 : miaubiz CVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3612 : Skylined of the Google Chrome Security Team CVE-2012-3613 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3614 : Yong Li of Research In Motion, Inc. CVE-2012-3616 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3617 : Apple Product Security CVE-2012-3621 : Skylined of the Google Chrome Security Team CVE-2012-3622 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3623 : Skylined of the Google Chrome Security Team CVE-2012-3624 : Skylined of the Google Chrome Security Team CVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3643 : Skylined of the Google Chrome Security Team CVE-2012-3647 : Skylined of the Google Chrome Security Team CVE-2012-3648 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3649 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team CVE-2012-3651 : Abhishek Arya and Martin Barbella of the Google Chrome Security Team CVE-2012-3652 : Martin Barbella of Google Chrome Security Team CVE-2012-3654 : Skylined of the Google Chrome Security Team CVE-2012-3657 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3658 : Apple CVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3660 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome Security Team CVE-2012-3672 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3673 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3675 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3676 : Julien Chaffraix of the Chromium development community CVE-2012-3677 : Apple CVE-2012-3684 : kuzzcc CVE-2012-3685 : Apple Product Security CVE-2012-3687 : kuzzcc CVE-2012-3688 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3692 : Skylined of the Google Chrome Security Team, Apple Product Security CVE-2012-3699 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3700 : Apple Product Security CVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3702 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3703 : Apple Product Security CVE-2012-3704 : Skylined of the Google Chrome Security Team CVE-2012-3705 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3706 : Apple Product Security CVE-2012-3707 : Abhishek Arya (Inferno) of the Google Chrome Security Team CVE-2012-3708 : Apple CVE-2012-3709 : Apple Product Security CVE-2012-3710 : James Robinson of Google CVE-2012-3711 : Skylined of the Google Chrome Security Team CVE-2012-3712 : Abhishek Arya (Inferno) of the Google Chrome Security Team
For OS X Lion systems Safari 6.0.1 is available via the Apple Software Update application.
For OS X Mountain Lion systems, Safari 6.0.1 is included with OS X v10.8.2.
Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org
iQIcBAEBAgAGBQJQWho/AAoJEPefwLHPlZEwG9kP/A2FKYpkYoEnaHSaCeI8W/Gt F+EjtnJ85SnVz76a81dt7O+F65pYMjMYEEHthgw62JAbZHrw93gf1dWpp+0IfXJZ w/dOV6yNxYmDOh0zir1I2tCIplkD2MvUrubcW+UCwDbVxnGKsTNBWzovHpvos2Uk lRn6Bl1wM5vOthJO14Z6iS0XX4GkefA3XzoVqY6dU0c9mxrTQhtMWvL+Pb1UpqX3 CZLcMmFGRuCE/+aM+d1x749PEteNDbrnw/aYfMyMSUNgb43EaUxCzTiUU+NvzsFL Ah33i29Li38nl+rLVgTRRU9EQVm1ZcujoftpgFw9prTd999f47eCSU5/QeDjY+Zw GLJRDfe/PP/GFKzAchefqS5x2PFUI9hZRGJEFviOEygfEPfYVCe/r/iMvBTtwfkn GVw1WIXcraqxXGzUNhCCZy3rcA8sSbJlCaIIr3VbtPS7PMHwjSaT+DBgD0hWtnk2 uATTye1UKG8m+FfwXn7ha3/W0kmdEGn1dBgpG2d35yXkGj7zgUgi4MX9HTVGTqEd Nvlzpffv5LCCdDqhRgqe4uT7fKmb46owoNNHM4eAH4A4EwHzA3lXQt5twhO9b2gL gWZ+bfwxfUaVlyBDPM1cUZ4e13HRiFPiRI9PJ2S5DrLoiMzpXIbBRH+5fs9uVvV+ zhJ+1dokzSpzRKJOq68N =xYhU -----END PGP SIGNATURE----- . ----------------------------------------------------------------------
The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/
TITLE: Apple iTunes Multiple WebKit Vulnerabilities
SECUNIA ADVISORY ID: SA50618
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50618/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50618
RELEASE DATE: 2012-09-13
DISCUSS ADVISORY: http://secunia.com/advisories/50618/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/50618/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=50618
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Multiple vulnerabilities have been reported in Apple iTunes, which can be exploited by malicious people to compromise a user's system.
For more information SA47231 SA47694 SA47938 SA48016 SA48265 SA48274 SA48512 SA48618 SA48732 SA48992 SA49194 SA49277 SA49724 SA49906 SA50058
The vulnerabilities are reported in versions prior to 10.7.
SOLUTION: Update to version 10.7.
Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
PROVIDED AND/OR DISCOVERED BY: 1) Reported by the vendor.
ORIGINAL ADVISORY: APPLE-SA-2012-09-12-1: http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201209-0341", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.1.0" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.5.0" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.5" }, { "model": "itunes", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.2.0" }, { "model": "itunes", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "10.5.1" }, { "model": "itunes", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "10.6" }, { "model": "itunes", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "10.5" }, { "model": "itunes", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "10.2" }, { "model": "itunes", "scope": "eq", "trust": 1.3, "vendor": "apple", "version": "10.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "8.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.2.2.12" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.4.0.80" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.2.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.5" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "5.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.1.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.2.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.5" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "5.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.7.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.9.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.7.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.7" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.4.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.6" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "8.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.0.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.1.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.6.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.1.1.4" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.7.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.7" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.0.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.1.42" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.7.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.4.1" }, { "model": "itunes", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "10.6.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.4" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.1.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.7.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.5.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.3.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.6.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.8.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.6.1" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "5.0" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.4.1.10" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "6.0.4" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.1.2" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "9.0.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.3" }, { "model": "itunes", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "7.0.2" }, { "model": "itunes", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "10.7" }, { "model": "safari", "scope": "lt", "trust": 0.8, "vendor": "apple", "version": "6.0.1" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "1.2.5" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "1.2.3" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "1.2.2" }, { "model": "open source project webkit r82222", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r77705", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r52833", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r52401", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r51295", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r38566", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r105591", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "2" }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "0" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "12.04" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.7" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "10" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5.0.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3.5" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.3" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "4" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" } ], "sources": [ { "db": "BID", "id": "55534" }, { "db": "JVNDB", "id": "JVNDB-2012-004346" }, { "db": "CNNVD", "id": "CNNVD-201209-245" }, { "db": "NVD", "id": "CVE-2012-3649" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:apple:itunes", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:safari", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004346" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Martin Barbella of the Google Chrome Security Team, miaubiz, Abhishek Arya of the Google Chrome Security Team, Skylined of the Google Chrome Security Team, Yong Li of Research In Motion, Apple Product Security, Dominic Cooney of Google, Apple, Mario Gomes", "sources": [ { "db": "BID", "id": "55534" } ], "trust": 0.3 }, "cve": "CVE-2012-3649", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2012-3649", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-56930", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2012-3649", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2012-3649", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201209-245", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-56930", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-56930" }, { "db": "JVNDB", "id": "JVNDB-2012-004346" }, { "db": "CNNVD", "id": "CNNVD-201209-245" }, { "db": "NVD", "id": "CVE-2012-3649" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1. WebKit is prone to multiple unspecified memory-corruption vulnerabilities. \nAn attacker can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage with a vulnerable application. \nFew technical details are currently available. We will update this BID when more information emerges. \nSuccessful exploits will allow attackers to execute arbitrary code in the context of the affected browser or cause denial-of-service conditions; other attacks may also be possible. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nAPPLE-SA-2012-09-19-3 Safari 6.0.1\n\nSafari 6.0.1 is now available and addresses the following:\n\nSafari\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8 and v10.8.1\nImpact: Opening a maliciously crafted downloaded HTML document may\nlead to the disclosure of local file content\nDescription: In OS X Mountain Lion HTML files were removed from the\nunsafe type list. Quarantined HTML documents are opened in a safe\nmode that prevents accessing other local or remote resources. A logic\nerror in Safari\u0027s handling of the Quarantine attribute caused the\nsafe mode not to be triggered on Quarantined files. This issue was\naddressed by properly detecting the existence of the Quarantine\nattribute. \nCVE-ID\nCVE-2012-3713 : Aaron Sigel of vtty.com, Masahiro Yamada\n\nSafari\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8 and v10.8.1\nImpact: Using Autofill on a maliciously crafted website may lead to\nthe disclosure of contact information\nDescription: A rare condition existed in the handling of Form\nAutofill. Using Form Autofill on a maliciously crafted website may\nhave led to disclosure of information from the Address Book \"Me\" card\nthat was not included in the Autofill popover. This issue was\naddressed by limiting Autofill to the fields contained in the\npopover. \nCVE-ID\nCVE-2012-3714 : Jonathan Hogervorst of Buzzera\n\nSafari\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8 and v10.8.1\nImpact: After editing a HTTPS URL in the address bar, a request may\nbe unexpectedly sent over HTTP\nDescription: A logic issue existed in the handling of HTTPS URLs in\nthe address bar. If a portion of the address was edited by pasting\ntext, the request may be unexpectedly sent over HTTP. This issue was\naddressed by improved handling of HTTPS URLs. \nCVE-ID\nCVE-2012-3715 : Aaron Rhoads of East Watch Services LLC, Pepi\nZawodsky\n\nWebKit\nAvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,\nOS X Mountain Lion v10.8 and v10.8.1\nImpact: Visiting a maliciously crafted website may lead to an\nunexpected application termination or arbitrary code execution\nDescription: Multiple memory corruption issues existed in WebKit. \nThese issues were addressed through improved memory handling. \nCVE-ID\nCVE-2011-3105 : miaubiz\nCVE-2012-2817 : miaubiz\nCVE-2012-2818 : miaubiz\nCVE-2012-2829 : miaubiz\nCVE-2012-2831 : miaubiz\nCVE-2012-2842 : miaubiz\nCVE-2012-2843 : miaubiz\nCVE-2012-3598 : Apple Product Security\nCVE-2012-3601 : Martin Barbella of the Google Chrome Security Team\nusing AddressSanitizer\nCVE-2012-3602 : miaubiz\nCVE-2012-3606 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3607 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3612 : Skylined of the Google Chrome Security Team\nCVE-2012-3613 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3614 : Yong Li of Research In Motion, Inc. \nCVE-2012-3616 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3617 : Apple Product Security\nCVE-2012-3621 : Skylined of the Google Chrome Security Team\nCVE-2012-3622 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3623 : Skylined of the Google Chrome Security Team\nCVE-2012-3624 : Skylined of the Google Chrome Security Team\nCVE-2012-3632 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3643 : Skylined of the Google Chrome Security Team\nCVE-2012-3647 : Skylined of the Google Chrome Security Team\nCVE-2012-3648 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3649 : Dominic Cooney of Google and Martin Barbella of the\nGoogle Chrome Security Team\nCVE-2012-3651 : Abhishek Arya and Martin Barbella of the Google\nChrome Security Team\nCVE-2012-3652 : Martin Barbella of Google Chrome Security Team\nCVE-2012-3654 : Skylined of the Google Chrome Security Team\nCVE-2012-3657 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3658 : Apple\nCVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya\n(Inferno) of the Google Chrome Security Team\nCVE-2012-3660 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome\nSecurity Team\nCVE-2012-3672 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3673 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3675 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3676 : Julien Chaffraix of the Chromium development\ncommunity\nCVE-2012-3677 : Apple\nCVE-2012-3684 : kuzzcc\nCVE-2012-3685 : Apple Product Security\nCVE-2012-3687 : kuzzcc\nCVE-2012-3688 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3692 : Skylined of the Google Chrome Security Team, Apple\nProduct Security\nCVE-2012-3699 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3700 : Apple Product Security\nCVE-2012-3701 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3702 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3703 : Apple Product Security\nCVE-2012-3704 : Skylined of the Google Chrome Security Team\nCVE-2012-3705 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3706 : Apple Product Security\nCVE-2012-3707 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\nCVE-2012-3708 : Apple\nCVE-2012-3709 : Apple Product Security\nCVE-2012-3710 : James Robinson of Google\nCVE-2012-3711 : Skylined of the Google Chrome Security Team\nCVE-2012-3712 : Abhishek Arya (Inferno) of the Google Chrome Security\nTeam\n\n\nFor OS X Lion systems Safari 6.0.1 is available via the Apple\nSoftware Update application. \n\nFor OS X Mountain Lion systems, Safari 6.0.1 is included with\nOS X v10.8.2. \n\nInformation will also be posted to the Apple Security Updates\nweb site: http://support.apple.com/kb/HT1222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG/MacGPG2 v2.0.17 (Darwin)\nComment: GPGTools - http://gpgtools.org\n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\nzhJ+1dokzSpzRKJOq68N\n=xYhU\n-----END PGP SIGNATURE-----\n. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \nFind out why this is not just another Patch Management solution: http://secunia.com/blog/325/\n\n----------------------------------------------------------------------\n\nTITLE:\nApple iTunes Multiple WebKit Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA50618\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/50618/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50618\n\nRELEASE DATE:\n2012-09-13\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/50618/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/50618/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50618\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nMultiple vulnerabilities have been reported in Apple iTunes, which\ncan be exploited by malicious people to compromise a user\u0027s system. \n\nFor more information\nSA47231\nSA47694\nSA47938\nSA48016\nSA48265\nSA48274\nSA48512\nSA48618\nSA48732\nSA48992\nSA49194\nSA49277\nSA49724\nSA49906\nSA50058\n\nThe vulnerabilities are reported in versions prior to 10.7. \n\nSOLUTION:\nUpdate to version 10.7. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\n1) Reported by the vendor. \n\nORIGINAL ADVISORY:\nAPPLE-SA-2012-09-12-1:\nhttp://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2012-3649" }, { "db": "JVNDB", "id": "JVNDB-2012-004346" }, { "db": "BID", "id": "55534" }, { "db": "VULHUB", "id": "VHN-56930" }, { "db": "PACKETSTORM", "id": "116793" }, { "db": "PACKETSTORM", "id": "116543" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2012-3649", "trust": 2.9 }, { "db": "BID", "id": "55534", "trust": 1.4 }, { "db": "OSVDB", "id": "85403", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2012-004346", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201209-245", "trust": 0.7 }, { "db": "SECUNIA", "id": "50618", "trust": 0.7 }, { "db": "NSFOCUS", "id": "20715", "trust": 0.6 }, { "db": "APPLE", "id": "APPLE-SA-2012-09-12-1", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-56930", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116793", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "116543", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-56930" }, { "db": "BID", "id": "55534" }, { "db": "JVNDB", "id": "JVNDB-2012-004346" }, { "db": "PACKETSTORM", "id": "116793" }, { "db": "PACKETSTORM", "id": "116543" }, { "db": "CNNVD", "id": "CNNVD-201209-245" }, { "db": "NVD", "id": "CVE-2012-3649" } ] }, "id": "VAR-201209-0341", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-56930" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T19:34:46.735000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "APPLE-SA-2012-09-12-1", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html" }, { "title": "HT5502", "trust": 0.8, "url": "http://support.apple.com/kb/HT5502" }, { "title": "HT5485", "trust": 0.8, "url": "http://support.apple.com/kb/HT5485" }, { "title": "HT5485", "trust": 0.8, "url": "http://support.apple.com/kb/HT5485?viewlocale=ja_JP" }, { "title": "HT5502", "trust": 0.8, "url": "http://support.apple.com/kb/HT5502?viewlocale=ja_JP" }, { "title": "iTunesSetup_11.0.0.163", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=44852" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004346" }, { "db": "CNNVD", "id": "CNNVD-201209-245" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2012-3649" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00001.html" }, { "trust": 1.7, "url": "http://support.apple.com/kb/ht5485" }, { "trust": 1.4, "url": "http://support.apple.com/kb/ht5502" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00005.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/55534" }, { "trust": 1.1, "url": "http://osvdb.org/85403" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a17272" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78526" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3649" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu503755/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3649" }, { "trust": 0.6, "url": "http://secunia.com/advisories/50618" }, { "trust": 0.6, "url": "http://www.nsfocus.net/vulndb/20715" }, { "trust": 0.3, "url": "http://www.apple.com/itunes/" }, { "trust": 0.3, "url": "http://www.webkit.org/" }, { "trust": 0.3, "url": "http://prod.lists.apple.com/archives/security-announce/2012/sep/msg00001.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2818" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3624" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3632" }, { "trust": 0.1, "url": "http://support.apple.com/kb/ht1222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3105" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3598" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3614" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3621" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2843" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3648" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3622" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3616" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2831" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2817" }, { "trust": 0.1, "url": "http://gpgtools.org" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2842" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3649" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2829" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3602" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3623" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3647" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3601" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3652" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3617" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3606" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3651" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3613" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3612" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3607" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3643" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/blog/325/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50618/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50618/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50618" } ], "sources": [ { "db": "VULHUB", "id": "VHN-56930" }, { "db": "BID", "id": "55534" }, { "db": "JVNDB", "id": "JVNDB-2012-004346" }, { "db": "PACKETSTORM", "id": "116793" }, { "db": "PACKETSTORM", "id": "116543" }, { "db": "CNNVD", "id": "CNNVD-201209-245" }, { "db": "NVD", "id": "CVE-2012-3649" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-56930" }, { "db": "BID", "id": "55534" }, { "db": "JVNDB", "id": "JVNDB-2012-004346" }, { "db": "PACKETSTORM", "id": "116793" }, { "db": "PACKETSTORM", "id": "116543" }, { "db": "CNNVD", "id": "CNNVD-201209-245" }, { "db": "NVD", "id": "CVE-2012-3649" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-09-13T00:00:00", "db": "VULHUB", "id": "VHN-56930" }, { "date": "2012-09-12T00:00:00", "db": "BID", "id": "55534" }, { "date": "2012-09-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-004346" }, { "date": "2012-09-22T06:33:31", "db": "PACKETSTORM", "id": "116793" }, { "date": "2012-09-14T01:16:24", "db": "PACKETSTORM", "id": "116543" }, { "date": "2012-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201209-245" }, { "date": "2012-09-13T10:30:19.697000", "db": "NVD", "id": "CVE-2012-3649" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-09-19T00:00:00", "db": "VULHUB", "id": "VHN-56930" }, { "date": "2013-01-28T21:00:00", "db": "BID", "id": "55534" }, { "date": "2012-10-16T00:00:00", "db": "JVNDB", "id": "JVNDB-2012-004346" }, { "date": "2012-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201209-245" }, { "date": "2024-11-21T01:41:20.727000", "db": "NVD", "id": "CVE-2012-3649" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201209-245" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Apple Used in products Webkit Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2012-004346" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201209-245" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.