ID

VAR-200509-0135


CVE

CVE-2005-3018


TITLE

Apple Safari Remote denial of service vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-200509-214

DESCRIPTION

Apple Safari allows remote attackers to cause a denial of service (application crash) via a crafted data:// URL. Apple Safari is prone to a memory corruption vulnerability. This issue is exposed when the browser opens specific 'data:' URIs, causing the browser to crash. Though unconfirmed, this vulnerability could be exploitable to execute arbitrary code. Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Safari "data:" URI Handler Denial of Service Weakness SECUNIA ADVISORY ID: SA16875 VERIFY ADVISORY: http://secunia.com/advisories/16875/ CRITICAL: Not critical IMPACT: DoS WHERE: >From remote SOFTWARE: Safari 2.x http://secunia.com/product/5289/ DESCRIPTION: Jonathan Rockway has discovered a weakness in Safari, which can be exploited by malicious people to cause a DoS (Denial of Service). The weakness is caused due to an error in the processing of URLs in the "data:" URI handler. This can be exploited to crash a vulnerable browser via e.g. an image tag referencing a specially crafted "data:" URL. Example: data://<h1>crash</h1> The weakness has been confirmed in version 2.0 (412.2). Other versions may also be affected. SOLUTION: Do not browse untrusted web sites. PROVIDED AND/OR DISCOVERED BY: Jonathan Rockway ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 1.35

sources: NVD: CVE-2005-3018 // BID: 14868 // VULHUB: VHN-14227 // PACKETSTORM: 40131

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:1.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:1.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:1.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:1.0

Trust: 1.9

vendor:applemodel:safariscope:eqversion:2.0

Trust: 1.6

vendor:applemodel:mobile safariscope:eqversion:0

Trust: 0.3

sources: BID: 14868 // NVD: CVE-2005-3018 // CNNVD: CNNVD-200509-214

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2005-3018
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-200509-214
value: MEDIUM

Trust: 0.6

VULHUB: VHN-14227
value: MEDIUM

Trust: 0.1

NVD:
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: FALSE
obtainAllPrivilege: FALSE
obtainUserPrivilege: FALSE
obtainOtherPrivilege: FALSE
userInteractionRequired: FALSE
version: 2.0

Trust: 1.0

VULHUB: VHN-14227
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-14227 // NVD: CVE-2005-3018 // CNNVD: CNNVD-200509-214

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2005-3018

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200509-214

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-200509-214

CONFIGURATIONS

sources: NVD: CVE-2005-3018

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-14227

EXTERNAL IDS

db:BIDid:14868

Trust: 2.0

db:SECUNIAid:16875

Trust: 1.8

db:OSVDBid:19569

Trust: 1.7

db:NVDid:CVE-2005-3018

Trust: 1.7

db:CNNVDid:CNNVD-200509-214

Trust: 0.7

db:XFid:22331

Trust: 0.6

db:BUGTRAQid:20050917 POSSIBLE MEMORY CORRUPTION PROBLEMS IN APPLE SAFARI

Trust: 0.6

db:SEEBUGid:SSVID-79913

Trust: 0.1

db:EXPLOIT-DBid:26271

Trust: 0.1

db:VULHUBid:VHN-14227

Trust: 0.1

db:PACKETSTORMid:40131

Trust: 0.1

sources: VULHUB: VHN-14227 // BID: 14868 // PACKETSTORM: 40131 // NVD: CVE-2005-3018 // CNNVD: CNNVD-200509-214

REFERENCES

url:http://secunia.com/advisories/16875/

Trust: 1.8

url:http://www.securityfocus.com/bid/14868

Trust: 1.7

url:http://www.osvdb.org/19569

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/22331

Trust: 1.1

url:http://marc.info/?l=bugtraq&m=112715234411672&w=2

Trust: 1.0

url:http://xforce.iss.net/xforce/xfdb/22331

Trust: 0.6

url:http://marc.theaimsgroup.com/?l=bugtraq&m=112715234411672&w=2

Trust: 0.6

url:http://www.apple.com/safari/

Trust: 0.3

url:/archive/1/411078

Trust: 0.3

url:http://marc.info/?l=bugtraq&amp;m=112715234411672&amp;w=2

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/5289/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-14227 // BID: 14868 // PACKETSTORM: 40131 // NVD: CVE-2005-3018 // CNNVD: CNNVD-200509-214

CREDITS

Jonathan Rockway jrockw2@uic.edu

Trust: 0.6

sources: CNNVD: CNNVD-200509-214

SOURCES

db:VULHUBid:VHN-14227
db:BIDid:14868
db:PACKETSTORMid:40131
db:NVDid:CVE-2005-3018
db:CNNVDid:CNNVD-200509-214

LAST UPDATE DATE

2023-12-18T14:02:45.480000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-14227date:2017-07-11T00:00:00
db:BIDid:14868date:2005-09-17T00:00:00
db:NVDid:CVE-2005-3018date:2017-07-11T01:33:04.813
db:CNNVDid:CNNVD-200509-214date:2005-10-20T00:00:00

SOURCES RELEASE DATE

db:VULHUBid:VHN-14227date:2005-09-21T00:00:00
db:BIDid:14868date:2005-09-17T00:00:00
db:PACKETSTORMid:40131date:2005-09-21T01:21:34
db:NVDid:CVE-2005-3018date:2005-09-21T22:03:00
db:CNNVDid:CNNVD-200509-214date:2005-09-21T00:00:00