ID

VAR-200809-0573


CVE

CVE-2008-3632


TITLE

Apple iPod touch and iPhone of WebKit In Cascading Style sheet (CSS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2008-001691

DESCRIPTION

Use-after-free vulnerability in WebKit in Apple iPod touch 1.1 through 2.0.2, and iPhone 1.0 through 2.0.2, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a web page with crafted Cascading Style Sheets (CSS) import statements. Apple iPod touch and iPhone are prone to multiple remote vulnerabilities: 1. A vulnerability that may allow users to spoof websites. 2. An information-disclosure vulnerability. 3. A remote code-execution vulnerability. Successfully exploiting these issues may allow attackers to execute arbitrary code, crash the affected application, obtain sensitive information, or direct unsuspecting victims to a spoofed site; other attacks are also possible. These issues affect versions prior to iPod touch 2.1 and iPhone 2.1. 1) An error in the application sandbox causes it to not properly enforce access restrictions between third-party applications. This can be exploited by one application to read another application's files. 2) Multiple errors exist in the included version of FreeType, which potentially can be exploited by malicious people to execute arbitrary code when accessing specially crafted font data. For more information: SA30600 3) mDNSResponder does not provide sufficient randomization, which can be exploited to poison the DNS cache. For more information: SA30973 4) Generation of predictable TCP initial sequence numbers can be exploited to spoof TCP connections or hijack sessions. 3) The vendor credits Dan Kaminsky, IOActive. For more information: SA31823 An error in the handling of emergency calls has also been reported. This can be exploited to bypass the Passcode Lock feature and allows users with physical access to an iPhone to launch applications without the passcode. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Apple Safari Multiple Vulnerabilities SECUNIA ADVISORY ID: SA35379 VERIFY ADVISORY: http://secunia.com/advisories/35379/ DESCRIPTION: Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to disclose sensitive information or compromise a user's system. 1) An error in the handling of TrueType fonts can be exploited to corrupt memory when a user visits a web site embedding a specially crafted font. Successful exploitation may allow execution of arbitrary code. 2) Some vulnerabilities in FreeType can potentially be exploited to compromise a user's system. For more information: SA34723 3) Some vulnerabilities in libpng can potentially be exploited to compromise a user's system. For more information: SA33970 4) An error in the processing of external entities in XML files can be exploited to read files from the user's system when a users visits a specially crafted web page. Other vulnerabilities have also been reported of which some may also affect Safari version 3.x. SOLUTION: Upgrade to Safari version 4, which fixes the vulnerabilities. PROVIDED AND/OR DISCOVERED BY: 1-3) Tavis Ormandy 4) Chris Evans of Google Inc. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT3613 Chris Evans: http://scary.beasts.org/security/CESA-2009-006.html OTHER REFERENCES: SA33970: http://secunia.com/advisories/33970/ SA34723: http://secunia.com/advisories/34723/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . =========================================================== Ubuntu Security Notice USN-676-1 November 24, 2008 webkit vulnerability CVE-2008-3632 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 8.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.10: libwebkit-1.0-1 1.0.1-2ubuntu0.1 After a standard system upgrade you need to restart any applications that use WebKit, such as Epiphany-webkit and Midori, to effect the necessary changes

Trust: 2.52

sources: NVD: CVE-2008-3632 // JVNDB: JVNDB-2008-001691 // BID: 31092 // VULHUB: VHN-33757 // PACKETSTORM: 72304 // PACKETSTORM: 69846 // PACKETSTORM: 70006 // PACKETSTORM: 70466 // PACKETSTORM: 78192 // PACKETSTORM: 72219

AFFECTED PRODUCTS

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 1.9

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 1.9

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 1.9

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 1.9

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 1.9

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 1.9

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 1.9

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 1.9

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 1.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 1.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 1.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 1.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 1.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 1.3

vendor:applemodel:iphone osscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:1.1.2

Trust: 1.0

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.9

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.7

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.7

Trust: 0.8

vendor:applemodel:iphonescope:eqversion:v1.0 to v2.0.2

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:v1.1 to v2.0.2

Trust: 0.8

vendor:applemodel:safariscope:ltversion:4.0

Trust: 0.8

vendor:ubuntumodel:linux sparcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:8.10

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:4

Trust: 0.3

vendor:applemodel:safariscope:neversion:4

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:neversion:2.1

Trust: 0.3

sources: BID: 31092 // JVNDB: JVNDB-2008-001691 // CNNVD: CNNVD-200809-127 // NVD: CVE-2008-3632

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-3632
value: HIGH

Trust: 1.0

NVD: CVE-2008-3632
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200809-127
value: MEDIUM

Trust: 0.6

VULHUB: VHN-33757
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-3632
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-33757
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-33757 // JVNDB: JVNDB-2008-001691 // CNNVD: CNNVD-200809-127 // NVD: CVE-2008-3632

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.1

problemtype:CWE-20

Trust: 0.8

sources: VULHUB: VHN-33757 // JVNDB: JVNDB-2008-001691 // NVD: CVE-2008-3632

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200809-127

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200809-127

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001691

PATCH

title:HT3129url:http://support.apple.com/kb/HT3129

Trust: 0.8

title:HT3613url:http://support.apple.com/kb/HT3613

Trust: 0.8

title:HT3026url:http://support.apple.com/kb/HT3026

Trust: 0.8

title:HT3026url:http://support.apple.com/kb/HT3026?locale=ja_JP

Trust: 0.8

title:HT3129url:http://support.apple.com/kb/HT3129?locale=ja_JP

Trust: 0.8

title:HT3613url:http://support.apple.com/kb/HT3613?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001691

EXTERNAL IDS

db:NVDid:CVE-2008-3632

Trust: 2.9

db:BIDid:31092

Trust: 2.8

db:SECUNIAid:31823

Trust: 2.6

db:SECUNIAid:31900

Trust: 2.6

db:SECUNIAid:32860

Trust: 1.8

db:SECUNIAid:35379

Trust: 1.8

db:SECUNIAid:32099

Trust: 1.8

db:VUPENid:ADV-2009-1522

Trust: 1.7

db:VUPENid:ADV-2008-2558

Trust: 1.7

db:VUPENid:ADV-2008-2525

Trust: 1.7

db:SECTRACKid:1020847

Trust: 1.7

db:JVNDBid:JVNDB-2008-001691

Trust: 0.8

db:CNNVDid:CNNVD-200809-127

Trust: 0.6

db:PACKETSTORMid:72219

Trust: 0.2

db:VULHUBid:VHN-33757

Trust: 0.1

db:PACKETSTORMid:72304

Trust: 0.1

db:PACKETSTORMid:69846

Trust: 0.1

db:PACKETSTORMid:70006

Trust: 0.1

db:PACKETSTORMid:70466

Trust: 0.1

db:PACKETSTORMid:78192

Trust: 0.1

sources: VULHUB: VHN-33757 // BID: 31092 // JVNDB: JVNDB-2008-001691 // PACKETSTORM: 72304 // PACKETSTORM: 69846 // PACKETSTORM: 70006 // PACKETSTORM: 70466 // PACKETSTORM: 78192 // PACKETSTORM: 72219 // CNNVD: CNNVD-200809-127 // NVD: CVE-2008-3632

REFERENCES

url:http://www.securityfocus.com/bid/31092

Trust: 2.5

url:http://secunia.com/advisories/31823

Trust: 2.5

url:http://secunia.com/advisories/31900

Trust: 2.5

url:http://support.apple.com/kb/ht3026

Trust: 1.8

url:http://support.apple.com/kb/ht3129

Trust: 1.8

url:http://support.apple.com/kb/ht3613

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00003.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/sep/msg00004.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html

Trust: 1.7

url:http://www.securitytracker.com/id?1020847

Trust: 1.7

url:http://secunia.com/advisories/32099

Trust: 1.7

url:http://secunia.com/advisories/32860

Trust: 1.7

url:http://secunia.com/advisories/35379

Trust: 1.7

url:http://www.ubuntu.com/usn/usn-676-1

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2525

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2558

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1522

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-3632

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2558

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2525

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-3632

Trust: 0.8

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.5

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.5

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.5

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:http://secunia.com/advisories/31823/

Trust: 0.3

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-2ubuntu0.1.dsc

Trust: 0.2

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.1_sparc.deb

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.1_amd64.deb

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.1_i386.deb

Trust: 0.2

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.1_powerpc.deb

Trust: 0.2

url:http://secunia.com/advisories/business_solutions/

Trust: 0.2

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.1_lpia.deb

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-2ubuntu0.1.diff.gz

Trust: 0.2

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.1_lpia.deb

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-dev_1.0.1-2ubuntu0.1_all.deb

Trust: 0.2

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.1_sparc.deb

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1.orig.tar.gz

Trust: 0.2

url:http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.1_powerpc.deb

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.1_i386.deb

Trust: 0.2

url:http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.1_amd64.deb

Trust: 0.2

url:http://secunia.com/binary_analysis/sample_analysis/

Trust: 0.2

url:https://lists.ubuntu.com/archives/ubuntu-security-announce/2008-november/000786.html

Trust: 0.1

url:http://secunia.com/advisories/product/20299/

Trust: 0.1

url:http://secunia.com/advisories/32860/

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://secunia.com/advisories/30973/

Trust: 0.1

url:http://secunia.com/advisories/product/16074/

Trust: 0.1

url:http://secunia.com/advisories/30600/

Trust: 0.1

url:http://secunia.com/advisories/31900/

Trust: 0.1

url:http://secunia.com/advisories/product/15128/

Trust: 0.1

url:http://secunia.com/advisories/product/4664/

Trust: 0.1

url:http://secunia.com/advisories/product/13375/

Trust: 0.1

url:http://secunia.com/advisories/30957/

Trust: 0.1

url:http://secunia.com/advisories/31330/

Trust: 0.1

url:http://secunia.com/advisories/product/4118/

Trust: 0.1

url:http://secunia.com/advisories/32099/

Trust: 0.1

url:http://secunia.com/advisories/30627/

Trust: 0.1

url:http://secunia.com/advisories/product/19180/

Trust: 0.1

url:http://secunia.com/advisories/product/12192/

Trust: 0.1

url:http://secunia.com/advisories/product/16124/

Trust: 0.1

url:http://secunia.com/advisories/35379/

Trust: 0.1

url:http://secunia.com/advisories/33970/

Trust: 0.1

url:http://secunia.com/advisories/34723/

Trust: 0.1

url:http://scary.beasts.org/security/cesa-2009-006.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-3632

Trust: 0.1

sources: VULHUB: VHN-33757 // BID: 31092 // JVNDB: JVNDB-2008-001691 // PACKETSTORM: 72304 // PACKETSTORM: 69846 // PACKETSTORM: 70006 // PACKETSTORM: 70466 // PACKETSTORM: 78192 // PACKETSTORM: 72219 // CNNVD: CNNVD-200809-127 // NVD: CVE-2008-3632

CREDITS

Nicolas SeriotBryce Cogswell

Trust: 0.6

sources: CNNVD: CNNVD-200809-127

SOURCES

db:VULHUBid:VHN-33757
db:BIDid:31092
db:JVNDBid:JVNDB-2008-001691
db:PACKETSTORMid:72304
db:PACKETSTORMid:69846
db:PACKETSTORMid:70006
db:PACKETSTORMid:70466
db:PACKETSTORMid:78192
db:PACKETSTORMid:72219
db:CNNVDid:CNNVD-200809-127
db:NVDid:CVE-2008-3632

LAST UPDATE DATE

2025-04-10T22:16:51.309000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-33757date:2012-10-31T00:00:00
db:BIDid:31092date:2009-06-09T16:59:00
db:JVNDBid:JVNDB-2008-001691date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200809-127date:2022-08-10T00:00:00
db:NVDid:CVE-2008-3632date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-33757date:2008-09-11T00:00:00
db:BIDid:31092date:2008-09-09T00:00:00
db:JVNDBid:JVNDB-2008-001691date:2008-09-30T00:00:00
db:PACKETSTORMid:72304date:2008-11-25T17:53:04
db:PACKETSTORMid:69846date:2008-09-11T04:44:10
db:PACKETSTORMid:70006date:2008-09-16T00:07:21
db:PACKETSTORMid:70466date:2008-09-30T23:23:28
db:PACKETSTORMid:78192date:2009-06-10T12:30:42
db:PACKETSTORMid:72219date:2008-11-24T19:26:05
db:CNNVDid:CNNVD-200809-127date:2008-09-11T00:00:00
db:NVDid:CVE-2008-3632date:2008-09-11T01:13:09.960