ID

VAR-200901-0272


CVE

CVE-2009-0123


TITLE

Mac OS X and Windows Run on Apple Safari Vulnerable to browsing arbitrary files on client machines

Trust: 0.8

sources: JVNDB: JVNDB-2009-001676

DESCRIPTION

Unspecified vulnerability in Apple Safari on Mac OS X 10.5 and Windows allows remote attackers to read arbitrary files on a client machine via vectors related to the association of Safari with the (1) feed, (2) feeds, and (3) feedsearch URL types for RSS feeds. NOTE: as of 20090114, the only disclosure is a vague pre-advisory. However, because it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. Apple Safari is prone to multiple input-validation vulnerabilities. An attacker can exploit these issues by enticing an unsuspecting victim to visit a malicious website. Successfully exploiting these issues will allow the attacker to execute arbitrary JavaScript code in the local security zone. This may allow the attacker to obtain sensitive information that can aid in further attacks; other consequences may also occur. These issues affect versions prior to Safari 3.2.2 for Windows. NOTE: This BID was previously titled 'Apple Safari RSS Feed Information Disclosure Vulnerability', but has been updated to reflect new information. A remote attacker can use specific vectors to read arbitrary files on the client machine. These vectors are associated with Safari and feedsearch URL-like connections for (1) feeds, (2) feeds, and (3) RSS feeds. ---------------------------------------------------------------------- Did you know that a change in our assessment rating, exploit code availability, or if an updated patch is released by the vendor, is not part of this mailing-list? Click here to learn more: http://secunia.com/advisories/business_solutions/ ---------------------------------------------------------------------- TITLE: Apple Safari RSS Feed URL Handling Information Disclosure SECUNIA ADVISORY ID: SA33458 VERIFY ADVISORY: http://secunia.com/advisories/33458/ CRITICAL: Moderately critical IMPACT: Exposure of sensitive information WHERE: >From remote SOFTWARE: Safari 3.x http://secunia.com/advisories/product/17989/ Safari for Windows 3.x http://secunia.com/advisories/product/17978/ DESCRIPTION: Brian Mastenbrook has reported a vulnerability in Apple Safari, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to an unspecified error within the handling of RSS feed URLs and can potentially be exploited to gain access to sensitive information. SOLUTION: Do not visit untrusted web sites and don't follow untrusted links. PROVIDED AND/OR DISCOVERED BY: Brian Mastenbrook ORIGINAL ADVISORY: http://brian.mastenbrook.net/display/27 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-0123 // JVNDB: JVNDB-2009-001676 // BID: 33234 // VULHUB: VHN-37569 // PACKETSTORM: 74063

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:*

Trust: 1.0

vendor:applemodel:safariscope:eqversion:10.5

Trust: 0.8

vendor:applemodel:safariscope: - version: -

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.9

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.7

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.3

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:3.2.2

Trust: 0.3

sources: BID: 33234 // JVNDB: JVNDB-2009-001676 // CNNVD: CNNVD-200901-184 // NVD: CVE-2009-0123

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-0123
value: HIGH

Trust: 1.0

NVD: CVE-2009-0123
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200901-184
value: HIGH

Trust: 0.6

VULHUB: VHN-37569
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-0123
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-37569
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-37569 // JVNDB: JVNDB-2009-001676 // CNNVD: CNNVD-200901-184 // NVD: CVE-2009-0123

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: VULHUB: VHN-37569 // JVNDB: JVNDB-2009-001676 // NVD: CVE-2009-0123

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200901-184

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200901-184

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-001676

PATCH

title:Top Pageurl:http://support.apple.com/kb/HT1222

Trust: 0.8

sources: JVNDB: JVNDB-2009-001676

EXTERNAL IDS

db:NVDid:CVE-2009-0123

Trust: 2.8

db:BIDid:33234

Trust: 2.0

db:SECUNIAid:33458

Trust: 1.8

db:SECTRACKid:1021581

Trust: 1.7

db:JVNDBid:JVNDB-2009-001676

Trust: 0.8

db:CNNVDid:CNNVD-200901-184

Trust: 0.7

db:XFid:47917

Trust: 0.6

db:VULHUBid:VHN-37569

Trust: 0.1

db:PACKETSTORMid:74063

Trust: 0.1

sources: VULHUB: VHN-37569 // BID: 33234 // JVNDB: JVNDB-2009-001676 // PACKETSTORM: 74063 // CNNVD: CNNVD-200901-184 // NVD: CVE-2009-0123

REFERENCES

url:http://brian.mastenbrook.net/display/27

Trust: 2.1

url:http://www.securityfocus.com/bid/33234

Trust: 1.7

url:http://isc.sans.org/diary.html?storyid=5689

Trust: 1.7

url:http://www.securitytracker.com/id?1021581

Trust: 1.7

url:http://secunia.com/advisories/33458

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/47917

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0123

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0123

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/47917

Trust: 0.6

url:http://support.apple.com/kb/ht3438

Trust: 0.3

url:http://www.apple.com/safari/

Trust: 0.3

url:http://secunia.com/advisories/33458/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/product/17978/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/product/17989/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-37569 // BID: 33234 // JVNDB: JVNDB-2009-001676 // PACKETSTORM: 74063 // CNNVD: CNNVD-200901-184 // NVD: CVE-2009-0123

CREDITS

Brian Mastenbrook, Clint Ruoho of Laconic Security, and Billy Rios of Microsoft

Trust: 0.3

sources: BID: 33234

SOURCES

db:VULHUBid:VHN-37569
db:BIDid:33234
db:JVNDBid:JVNDB-2009-001676
db:PACKETSTORMid:74063
db:CNNVDid:CNNVD-200901-184
db:NVDid:CVE-2009-0123

LAST UPDATE DATE

2025-04-10T20:31:56.119000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-37569date:2017-08-08T00:00:00
db:BIDid:33234date:2016-07-06T14:18:00
db:JVNDBid:JVNDB-2009-001676date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200901-184date:2009-01-22T00:00:00
db:NVDid:CVE-2009-0123date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-37569date:2009-01-15T00:00:00
db:BIDid:33234date:2009-01-11T00:00:00
db:JVNDBid:JVNDB-2009-001676date:2009-07-08T00:00:00
db:PACKETSTORMid:74063date:2009-01-20T14:28:36
db:CNNVDid:CNNVD-200901-184date:2009-01-15T00:00:00
db:NVDid:CVE-2009-0123date:2009-01-15T17:30:00.500