ID

VAR-200907-0135


CVE

CVE-2009-2419


TITLE

Apple Safari of servePendingRequests Service disruption in functions (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2009-003609

DESCRIPTION

Use-after-free vulnerability in the servePendingRequests function in WebCore in WebKit in Apple Safari 4.0 and 4.0.1 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted HTML document that references a zero-length .js file and the JavaScript reload function. NOTE: some of these details are obtained from third party information. Apple Safari is prone to a denial-of-service vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Given the nature of this issue, the attacker may also be able to run arbitrary code, but this has not been confirmed. Safari 4.0 and 4.0.1 are vulnerable; other versions may also be affected. Safari is the web browser bundled by default in the Apple family machine operating system. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Apple Safari WebKit "servePendingRequests()" Use-After-Free Weakness SECUNIA ADVISORY ID: SA33495 VERIFY ADVISORY: http://secunia.com/advisories/33495/ DESCRIPTION: A weakness has been discovered in Apple Safari, which can be exploited by malicious people to cause a DoS (Denial of Service). The weakness is caused due to a use-after-free error while calling the "servePendingRequests()" function in WebKit. This can be exploited to dereference invalid memory and cause a crash when a user visits a specially crafted web page. Successful exploitation crashes the browser. However, even though code execution has not been proven, it cannot be completely ruled out. NOTE: Secunia normally does not classify a browser crash as a vulnerability nor issue an advisory about it. However, the potential impact of this issue may be more severe than currently believed. The weakness is confirmed in Apple Safari version 4.0 (530.17) for Windows. SOLUTION: Fixed in the WebKit development repository. http://trac.webkit.org/changeset/44519 Do not browse untrusted websites or follow untrusted links. PROVIDED AND/OR DISCOVERED BY: Marcell 'SkyOut' Dietl and Achim Hoffmann ORIGINAL ADVISORY: http://marcell-dietl.de/index/adv_safari_4_x_js_reload_dos.php ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: SUSE update for Multiple Packages SECUNIA ADVISORY ID: SA43068 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43068/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43068 RELEASE DATE: 2011-01-25 DISCUSS ADVISORY: http://secunia.com/advisories/43068/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43068/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43068 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: SUSE has issued an update for multiple packages, which fixes multiple vulnerabilities. For more information: SA32349 SA33495 SA35095 SA35379 SA35411 SA35449 SA35758 SA36269 SA36677 SA37273 SA37346 SA37769 SA38061 SA38545 SA38932 SA39029 SA39091 SA39384 SA39661 SA39937 SA40002 SA40072 SA40105 SA40112 SA40148 SA40196 SA40257 SA40664 SA40783 SA41014 SA41085 SA41242 SA41328 SA41390 SA41443 SA41535 SA41841 SA41888 SA41968 SA42151 SA42264 SA42290 SA42312 SA42443 SA42461 SA42658 SA42769 SA42886 SA42956 SA43053 SOLUTION: Apply updated packages via YaST Online Update or the SUSE FTP server

Trust: 2.16

sources: NVD: CVE-2009-2419 // JVNDB: JVNDB-2009-003609 // BID: 35555 // VULHUB: VHN-39865 // PACKETSTORM: 78902 // PACKETSTORM: 97846

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0 and 4.0.1

Trust: 0.8

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

sources: BID: 35555 // JVNDB: JVNDB-2009-003609 // CNNVD: CNNVD-200907-153 // NVD: CVE-2009-2419

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2419
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-2419
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200907-153
value: MEDIUM

Trust: 0.6

VULHUB: VHN-39865
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-2419
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-39865
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-39865 // JVNDB: JVNDB-2009-003609 // CNNVD: CNNVD-200907-153 // NVD: CVE-2009-2419

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-39865 // JVNDB: JVNDB-2009-003609 // NVD: CVE-2009-2419

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200907-153

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200907-153

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-003609

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-39865

PATCH

title:Top Pageurl:http://www.apple.com/safari/

Trust: 0.8

sources: JVNDB: JVNDB-2009-003609

EXTERNAL IDS

db:NVDid:CVE-2009-2419

Trust: 2.8

db:BIDid:35555

Trust: 2.0

db:SECUNIAid:33495

Trust: 1.8

db:OSVDBid:55587

Trust: 1.7

db:SECUNIAid:43068

Trust: 1.2

db:VUPENid:ADV-2011-0212

Trust: 1.1

db:JVNDBid:JVNDB-2009-003609

Trust: 0.8

db:XFid:51533

Trust: 0.6

db:CNNVDid:CNNVD-200907-153

Trust: 0.6

db:SEEBUGid:SSVID-86317

Trust: 0.1

db:EXPLOIT-DBid:33062

Trust: 0.1

db:VULHUBid:VHN-39865

Trust: 0.1

db:PACKETSTORMid:78902

Trust: 0.1

db:PACKETSTORMid:97846

Trust: 0.1

sources: VULHUB: VHN-39865 // BID: 35555 // JVNDB: JVNDB-2009-003609 // PACKETSTORM: 78902 // PACKETSTORM: 97846 // CNNVD: CNNVD-200907-153 // NVD: CVE-2009-2419

REFERENCES

url:http://trac.webkit.org/changeset/44519

Trust: 2.1

url:http://marcell-dietl.de/index/adv_safari_4_x_js_reload_dos.php

Trust: 2.1

url:http://www.securityfocus.com/bid/35555

Trust: 1.7

url:http://www.osvdb.org/55587

Trust: 1.7

url:http://secunia.com/advisories/33495

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

Trust: 1.2

url:http://secunia.com/advisories/43068

Trust: 1.1

url:http://www.vupen.com/english/advisories/2011/0212

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/51533

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2419

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2419

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/51533

Trust: 0.6

url:http://www.apple.com/safari/

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/advisories/33495/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43068

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/advisories/43068/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/43068/

Trust: 0.1

sources: VULHUB: VHN-39865 // BID: 35555 // JVNDB: JVNDB-2009-003609 // PACKETSTORM: 78902 // PACKETSTORM: 97846 // CNNVD: CNNVD-200907-153 // NVD: CVE-2009-2419

CREDITS

Marcell Dietl Achim Hoffmann

Trust: 0.6

sources: CNNVD: CNNVD-200907-153

SOURCES

db:VULHUBid:VHN-39865
db:BIDid:35555
db:JVNDBid:JVNDB-2009-003609
db:PACKETSTORMid:78902
db:PACKETSTORMid:97846
db:CNNVDid:CNNVD-200907-153
db:NVDid:CVE-2009-2419

LAST UPDATE DATE

2025-04-10T21:34:18.367000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39865date:2017-08-17T00:00:00
db:BIDid:35555date:2015-04-13T21:09:00
db:JVNDBid:JVNDB-2009-003609date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200907-153date:2009-07-10T00:00:00
db:NVDid:CVE-2009-2419date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-39865date:2009-07-09T00:00:00
db:BIDid:35555date:2009-07-02T00:00:00
db:JVNDBid:JVNDB-2009-003609date:2012-06-26T00:00:00
db:PACKETSTORMid:78902date:2009-07-06T09:26:40
db:PACKETSTORMid:97846date:2011-01-25T03:59:20
db:CNNVDid:CNNVD-200907-153date:2009-07-09T00:00:00
db:NVDid:CVE-2009-2419date:2009-07-09T16:30:00.890