ID

VAR-201110-0335


CVE

CVE-2011-3231


TITLE

Mac OS X Work on Apple Safari of SSL An arbitrary code execution vulnerability in the implementation

Trust: 0.8

sources: JVNDB: JVNDB-2011-002490

DESCRIPTION

The SSL implementation in Apple Safari before 5.1.1 on Mac OS X before 10.7 accesses uninitialized memory during the processing of X.509 certificates, which allows remote web servers to execute arbitrary code via a crafted certificate. Apple Safari is prone to a remote code-execution vulnerability. Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed exploit attempts will crash the application. This issue affects Apple Safari versions prior to 5.1.1. NOTE: This issue was previously covered in BID 50089 (Apple Safari Prior to 5.1.1 Multiple Security Vulnerabilities) but has been given its own record to better document it. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. This vulnerability does not affect OS X Lion systems or Windows systems

Trust: 1.98

sources: NVD: CVE-2011-3231 // JVNDB: JVNDB-2011-002490 // BID: 50169 // VULHUB: VHN-51176

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:3.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3.0.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 1.6

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 1.1

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:safariscope:lteversion:5.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0b1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:*

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.6.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.8

Trust: 0.8

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:neversion:5.1.1

Trust: 0.3

sources: BID: 50169 // JVNDB: JVNDB-2011-002490 // CNNVD: CNNVD-201110-326 // NVD: CVE-2011-3231

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3231
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-3231
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201110-326
value: MEDIUM

Trust: 0.6

VULHUB: VHN-51176
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-3231
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-51176
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-51176 // JVNDB: JVNDB-2011-002490 // CNNVD: CNNVD-201110-326 // NVD: CVE-2011-3231

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-51176 // JVNDB: JVNDB-2011-002490 // NVD: CVE-2011-3231

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201110-326

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201110-326

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-002490

PATCH

title:HT5000url:http://support.apple.com/kb/HT5000

Trust: 0.8

title:SafariSetupurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=40900

Trust: 0.6

title:Safari5.1.1SnowLeopardurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=40899

Trust: 0.6

title:Safari5.1.1Lionurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=40898

Trust: 0.6

sources: JVNDB: JVNDB-2011-002490 // CNNVD: CNNVD-201110-326

EXTERNAL IDS

db:NVDid:CVE-2011-3231

Trust: 2.8

db:OSVDBid:76390

Trust: 1.1

db:JVNDBid:JVNDB-2011-002490

Trust: 0.8

db:CNNVDid:CNNVD-201110-326

Trust: 0.7

db:NSFOCUSid:17923

Trust: 0.6

db:APPLEid:APPLE-SA-2011-10-12-4

Trust: 0.6

db:SECUNIAid:46412

Trust: 0.6

db:BIDid:50169

Trust: 0.4

db:VULHUBid:VHN-51176

Trust: 0.1

sources: VULHUB: VHN-51176 // BID: 50169 // JVNDB: JVNDB-2011-002490 // CNNVD: CNNVD-201110-326 // NVD: CVE-2011-3231

REFERENCES

url:http://lists.apple.com/archives/security-announce/2011//oct/msg00004.html

Trust: 1.7

url:http://support.apple.com/kb/ht5000

Trust: 1.7

url:http://osvdb.org/76390

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/70568

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3231

Trust: 0.8

url:http://jvn.jp/cert/jvnvu585859

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3231

Trust: 0.8

url:http://secunia.com/advisories/46412

Trust: 0.6

url:http://www.nsfocus.net/vulndb/17923

Trust: 0.6

url:http://www.apple.com/safari/

Trust: 0.3

sources: VULHUB: VHN-51176 // BID: 50169 // JVNDB: JVNDB-2011-002490 // CNNVD: CNNVD-201110-326 // NVD: CVE-2011-3231

CREDITS

Jason Broccardo of Fermi National Accelerator Laboratory

Trust: 0.3

sources: BID: 50169

SOURCES

db:VULHUBid:VHN-51176
db:BIDid:50169
db:JVNDBid:JVNDB-2011-002490
db:CNNVDid:CNNVD-201110-326
db:NVDid:CVE-2011-3231

LAST UPDATE DATE

2025-04-11T20:25:54.307000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-51176date:2017-08-29T00:00:00
db:BIDid:50169date:2011-10-12T00:00:00
db:JVNDBid:JVNDB-2011-002490date:2011-10-25T00:00:00
db:CNNVDid:CNNVD-201110-326date:2011-11-07T00:00:00
db:NVDid:CVE-2011-3231date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-51176date:2011-10-14T00:00:00
db:BIDid:50169date:2011-10-12T00:00:00
db:JVNDBid:JVNDB-2011-002490date:2011-10-25T00:00:00
db:CNNVDid:CNNVD-201110-326date:2011-10-17T00:00:00
db:NVDid:CVE-2011-3231date:2011-10-14T10:55:09.557