ID

VAR-201203-0032


CVE

CVE-2012-0584


TITLE

Windows Run on Apple Safari of IDN Domain name spoofing vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-001741

DESCRIPTION

The Internationalized Domain Name (IDN) feature in Apple Safari before 5.1.4 on Windows does not properly restrict the characters in URLs, which allows remote attackers to spoof a domain name via unspecified homoglyphs. An attacker may leverage this issue to spoof the source URI of a site presented to an unsuspecting user. This may lead to a false sense of trust because the user may be presented with a source URI of a trusted site while interacting with the attacker's malicious site. Versions prior to Apple Safari 5.1.4 on Windows systems are vulnerable. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. This issue is addressed through an improved domain name validity check. This issue does not affect OS X systems. CVE-ID CVE-2012-0584 : Matt Cooley of Symantec Safari Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.3, OS X Lion Server v10.7.3, Windows 7, Vista, XP SP2 or later Impact: Web page visits may be recorded in browser history even when Private Browsing is active Description: Safari's Private Browsing is designed to prevent recording of a browsing session. CVE-ID CVE-2012-0585 : Eric Melville of American Express WebKit Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.3, OS X Lion Server v10.7.3, Windows 7, Vista, XP SP2 or later Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: Multiple cross-site scripting issues existed in WebKit CVE-ID CVE-2011-3881 : Sergey Glazunov CVE-2012-0586 : Sergey Glazunov CVE-2012-0587 : Sergey Glazunov CVE-2012-0588 : Jochen Eisinger of Google Chrome Team CVE-2012-0589 : Alan Austin of polyvore.com WebKit Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.3, OS X Lion Server v10.7.3, Windows 7, Vista, XP SP2 or later Impact: Visiting a maliciously crafted website may lead to the disclosure of cookies Description: A cross-origin issue existed in WebKit, which may allow cookies to be disclosed across origins. CVE-ID CVE-2011-3887 : Sergey Glazunov WebKit Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.3, OS X Lion Server v10.7.3, Windows 7, Vista, XP SP2 or later Impact: Visiting a maliciously crafted website and dragging content with the mouse may lead to a cross-site scripting attack Description: A cross-origin issue existed in WebKit, which may allow content to be dragged and dropped across origins. CVE-ID CVE-2012-0590 : Adam Barth of Google Chrome Security Team WebKit Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.3, OS X Lion Server v10.7.3, Windows 7, Vista, XP SP2 or later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. CVE-ID CVE-2012-0640 : nshah WebKit Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8, OS X Lion v10.7.3, OS X Lion Server v10.7.3, Windows 7, Vista, XP SP2 or later Impact: HTTP authentication credentials may be inadvertently disclosed to another site Description: If a site uses HTTP authentication and redirects to another site, the authentication credentials may be sent to the other site. CVE-ID CVE-2012-0647 : an anonymous researcher Safari 5.1.4 is available via the Apple Software Update application, or Apple's Safari download site at: http://www.apple.com/safari/download/ Safari for OS X Lion v10.7.3 The download file is named: Safari5.1.4LionManual.dmg Its SHA-1 digest is: 241bda1dcf34dcdb13e1848c11628173ca7c504f Safari for Mac OS X v10.6.8 The download file is named: Safari5.1.4SnowLeopardManual.dmg Its SHA-1 digest is: 5703ffce7bbf4a283d0b5dec382b762501f8f3d4 Safari for Windows 7, Vista or XP The download file is named: SafariSetup.exe Its SHA-1 digest is: 1a6712411a105b896eed1e1b0940e98f6e65c4f6 Safari for Windows 7, Vista or XP from the Microsoft Choice Screen The download file is named: Safari_Setup.exe Its SHA-1 digest is: 8094f7991ab1820aa35044cb8f5ba74db0a0b37a Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin) iQEcBAEBAgAGBQJPXifpAAoJEGnF2JsdZQee2GQH/R4lUIveYjpYn7fu7vCyLrUM 5JsmdOO3FOmBiDl4ULrGBdKzss4gGJOERdTCKZeDEFvpQIRzCkcp4w7cKDMoU6Zg DEz1dMQsbpXRQu6ageJ+P12mhDvUJ1dPxesFdMA5SOWrFglf/xz37yRKCM0/3hWq r6LhIaxRgKJjJaNBzWrGifLaOipJYo2X3bBQ1Tt1a79M5iVYbBlX458uop+vuK8H 9Whlriqc2sffmc7VGUBWZ8hSU6SP0S0fxh/A6ygSwqNzaHIl3g41v13tNzhrktmV kJ0Bk7iIaUmT3E3nd4hE4cX8sGj5SBk372UKYE5E2+cxpz2fVSbTwXbo1d6UuWc= =mKMo -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Apple Safari Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48377 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48377/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48377 RELEASE DATE: 2012-03-13 DISCUSS ADVISORY: http://secunia.com/advisories/48377/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48377/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48377 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose certain sensitive information, and compromise a user's system. 2) The Private Browsing feature does not properly prevent recording of visits to certain sites implementing the pushState or replaceState JavaScript methods. 3) Multiple errors in the WebKit component can be exploited to conduct cross-site scripting attacks. 4) An error within the WebKit component when handling drag-and-drop actions can be exploited to conduct cross-site scripting attacks. 5) Multiple errors within the WebKit component can be exploited to corrupt memory. Successful exploitation of this vulnerability may allow execution of arbitrary code. 6) An error within the cookie policy does not enforce the "Block Cookies" preference properly and can be exploited to set cookies from third-party sites. 7) An error in the WebKit component when handling redirects during HTTP Authentication can be exploited to disclose the credentials to another site. This may be related to: SA40110 SOLUTION: Update to version 5.1.4. PROVIDED AND/OR DISCOVERED BY: 5) Reported by the vendor. The vendor also credits miaubiz, Martin Barbella, Alexander Gavrun via ZDI, Lei Zhang of the Chromium development community, Adam Klein of the Chromium development community, Abhishek Arya (Inferno) of Google Chrome Security Team, Sergey Glazunov, Dmytro Gorbunov of SaveSources.com, Marshall Greenblatt, Dharani Govindan of Google Chrome, Aki Helin of OUSPG, Dave Levin, Slawomir Blazek, Sergio Villar Senin of Igalia, Cris Neckar of the Google Chrome Security Team, Julien Chaffraix of the Chromium development community, and Jeremy Apthorp of Google. The vendor credits: 1) Matt Cooley, Symantec 2) Eric Melville, American Express 3) Sergey Glazunov, Jochen Eisinger of Google Chrome Security Team, and Alan Austin of polyvore.com 4) Adam Barth, Google Chrome Security Team 6) nshah 7) An anonymous person ORIGINAL ADVISORY: http://support.apple.com/kb/HT5190 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2012-0584 // JVNDB: JVNDB-2012-001741 // BID: 52419 // VULHUB: VHN-53865 // PACKETSTORM: 110716 // PACKETSTORM: 110779

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:1.0.0b2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.0.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.0.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.0.0b1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.0.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3.0.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0b1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2

Trust: 1.0

vendor:applemodel:safariscope:lteversion:5.1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2

Trust: 1.0

vendor:applemodel:safariscope:ltversion:5.1.4

Trust: 0.8

vendor:applemodel:safari for windowsscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:5.1.4

Trust: 0.3

sources: BID: 52419 // JVNDB: JVNDB-2012-001741 // CNNVD: CNNVD-201203-213 // NVD: CVE-2012-0584

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0584
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0584
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201203-213
value: MEDIUM

Trust: 0.6

VULHUB: VHN-53865
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0584
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-53865
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53865 // JVNDB: JVNDB-2012-001741 // CNNVD: CNNVD-201203-213 // NVD: CVE-2012-0584

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-53865 // JVNDB: JVNDB-2012-001741 // NVD: CVE-2012-0584

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-213

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201203-213

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001741

PATCH

title:HT5190url:http://support.apple.com/kb/HT5190

Trust: 0.8

sources: JVNDB: JVNDB-2012-001741

EXTERNAL IDS

db:NVDid:CVE-2012-0584

Trust: 2.9

db:SECUNIAid:48377

Trust: 1.2

db:SECTRACKid:1026785

Trust: 1.1

db:OSVDBid:80088

Trust: 1.1

db:JVNDBid:JVNDB-2012-001741

Trust: 0.8

db:CNNVDid:CNNVD-201203-213

Trust: 0.7

db:NSFOCUSid:19064

Trust: 0.6

db:NSFOCUSid:19036

Trust: 0.6

db:APPLEid:APPLE-SA-2012-03-12-1

Trust: 0.6

db:BIDid:52419

Trust: 0.4

db:VULHUBid:VHN-53865

Trust: 0.1

db:PACKETSTORMid:110716

Trust: 0.1

db:PACKETSTORMid:110779

Trust: 0.1

sources: VULHUB: VHN-53865 // BID: 52419 // JVNDB: JVNDB-2012-001741 // PACKETSTORM: 110716 // PACKETSTORM: 110779 // CNNVD: CNNVD-201203-213 // NVD: CVE-2012-0584

REFERENCES

url:http://lists.apple.com/archives/security-announce/2012/mar/msg00003.html

Trust: 1.7

url:http://osvdb.org/80088

Trust: 1.1

url:http://www.securitytracker.com/id?1026785

Trust: 1.1

url:http://secunia.com/advisories/48377

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0584

Trust: 0.8

url:http://jvn.jp/cert/jvnvu428075/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0584

Trust: 0.8

url:http://www.nsfocus.net/vulndb/19064

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19036

Trust: 0.6

url:http://www.apple.com/safari/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2011-2867

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3888

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2872

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2871

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3887

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2869

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0584

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0585

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2860

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3885

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3928

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2873

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2870

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2847

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2868

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2855

Trust: 0.1

url:http://www.apple.com/safari/download/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2857

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3897

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2825

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2854

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3908

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0586

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3881

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3909

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2833

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2866

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2846

Trust: 0.1

url:http://support.apple.com/kb/ht5190

Trust: 0.1

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/48377/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/48377/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48377

Trust: 0.1

sources: VULHUB: VHN-53865 // BID: 52419 // JVNDB: JVNDB-2012-001741 // PACKETSTORM: 110716 // PACKETSTORM: 110779 // CNNVD: CNNVD-201203-213 // NVD: CVE-2012-0584

CREDITS

Matt Cooley of Symantec

Trust: 0.3

sources: BID: 52419

SOURCES

db:VULHUBid:VHN-53865
db:BIDid:52419
db:JVNDBid:JVNDB-2012-001741
db:PACKETSTORMid:110716
db:PACKETSTORMid:110779
db:CNNVDid:CNNVD-201203-213
db:NVDid:CVE-2012-0584

LAST UPDATE DATE

2025-04-11T20:03:12.898000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-53865date:2018-01-06T00:00:00
db:BIDid:52419date:2012-03-12T00:00:00
db:JVNDBid:JVNDB-2012-001741date:2012-03-14T00:00:00
db:CNNVDid:CNNVD-201203-213date:2012-03-15T00:00:00
db:NVDid:CVE-2012-0584date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-53865date:2012-03-12T00:00:00
db:BIDid:52419date:2012-03-12T00:00:00
db:JVNDBid:JVNDB-2012-001741date:2012-03-14T00:00:00
db:PACKETSTORMid:110716date:2012-03-13T00:58:40
db:PACKETSTORMid:110779date:2012-03-14T05:16:27
db:CNNVDid:CNNVD-201203-213date:2012-03-15T00:00:00
db:NVDid:CVE-2012-0584date:2012-03-12T21:55:00.903