ID

VAR-201203-0039


CVE

CVE-2012-0591


TITLE

plural Apple Used in products WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2012-001673

DESCRIPTION

WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2. WebKit is prone to multiple unspecified memory-corruption vulnerabilities. An attacker can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage with a vulnerable application. Few technical details are currently available. We will update this BID when more information emerges. Successful exploits will allow attackers to execute arbitrary code in the context of the affected browser or cause denial-of-service conditions; other attacks may also be possible. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. WebKit is vulnerable when used in Apple iOS versions prior to 5.1 and iTunes prior to 10.6. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Apple iOS Multiple Vulnerabilities SECUNIA ADVISORY ID: SA48288 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48288/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48288 RELEASE DATE: 2012-03-09 DISCUSS ADVISORY: http://secunia.com/advisories/48288/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48288/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48288 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A weakness and multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to bypass certain security restrictions and by malicious people to disclose sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's device. 2) An integer underflow error within the HFS component when handling HFS catalog files can be exploited by mounting a maliciously crafted disk image. 3) A logic error within the kernel does not properly handle debug system calls and can be exploited to bypass the sandbox restrictions. 4) An integer overflow error within the libresolv library when handling DNS resource records can be exploited to corrupt heap memory. For more information see vulnerability #21 in: SA47843 5) A race condition error in the Passcode Lock component when handling slide to dial gestures can be exploited to bypass the Passcode Lock screen. 6) The weakness is caused due to the Private Browsing mode in Safari not properly preventing recording of visits to certain sites using the pushState or replaceState JavaScript methods. 7) An error within the Siri component when handling voice commands can be exploited to bypass the screen lock and forward an open mail message to an arbitrary recipient. 8) A format string error in the VPN component when handling racoon configuration files can be exploited to execute arbitrary code via a specially crafted racoon configuration file. 10) An error within the WebKit component when handling drag-and-drop actions can be exploited to conduct cross-site scripting attacks. SOLUTION: Apply iOS 5.1 Software Update. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1) Erling Ellingsen, Facebook. 2, 8) pod2g. 3) 2012 iOS Jailbreak Dream Team. 5) Roland Kohler, the German Federal Ministry of Economics and Technology. 6) Eric Melville, American Express. 9) Sergey Glazunov. 10) Adam Barth, Google Chrome Security Team. 11) Sergey Glazunov, Jochen Eisinger of Google Chrome Team, Alan Austin of polyvore.com. ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT5192 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-03-07-1 iTunes 10.6 iTunes 10.6 is now available and addresses the following: WebKit Available for: Windows 7, Vista, XP SP2 or later Impact: A man-in-the-middle attack while browsing the iTunes Store via iTunes may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit

Trust: 2.34

sources: NVD: CVE-2012-0591 // JVNDB: JVNDB-2012-001673 // BID: 52365 // VULHUB: VHN-53872 // PACKETSTORM: 110644 // PACKETSTORM: 110650 // PACKETSTORM: 110590 // PACKETSTORM: 110779

AFFECTED PRODUCTS

vendor:applemodel:itunesscope:ltversion:10.6

Trust: 1.8

vendor:applemodel:iphone osscope:ltversion:5.1

Trust: 1.0

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.9

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.9

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.9

vendor:applemodel:mac os xscope:eqversion:v10.6.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.7.3

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.7.3

Trust: 0.8

vendor:applemodel:iosscope:ltversion:5.1 (ipad and ipad 2)

Trust: 0.8

vendor:applemodel:iosscope:ltversion:5.1 (iphone 3gs)

Trust: 0.8

vendor:applemodel:iosscope:ltversion:5.1 (iphone 4)

Trust: 0.8

vendor:applemodel:iosscope:ltversion:5.1 (iphone 4s)

Trust: 0.8

vendor:applemodel:iosscope:ltversion:5.1 (ipod touch (3rd generation) or later )

Trust: 0.8

vendor:applemodel:ipadscope: - version: -

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:safariscope:ltversion:5.1.4

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:10.4

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:10.3

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:10.5.2

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:10.1.1

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:10.4.1

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:10.1.2

Trust: 0.6

vendor:applemodel:itunesscope:eqversion:10.5.3

Trust: 0.6

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.5

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.3

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2

Trust: 0.3

vendor:webkitmodel:open source project webkit r82222scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r77705scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52833scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r52401scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r51295scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkit r38566scope: - version: -

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.x

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:1.2.2-1

Trust: 0.3

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:5.1.4

Trust: 0.3

vendor:applemodel:safariscope:neversion:5.1.4

Trust: 0.3

vendor:applemodel:itunesscope:neversion:10.6

Trust: 0.3

vendor:applemodel:iosscope:neversion:5.1

Trust: 0.3

sources: BID: 52365 // JVNDB: JVNDB-2012-001673 // CNNVD: CNNVD-201203-097 // NVD: CVE-2012-0591

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0591
value: HIGH

Trust: 1.0

NVD: CVE-2012-0591
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201203-097
value: CRITICAL

Trust: 0.6

VULHUB: VHN-53872
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-0591
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-53872
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53872 // JVNDB: JVNDB-2012-001673 // CNNVD: CNNVD-201203-097 // NVD: CVE-2012-0591

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-53872 // JVNDB: JVNDB-2012-001673 // NVD: CVE-2012-0591

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-097

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201203-097

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001673

PATCH

title:HT5192url:http://support.apple.com/kb/HT5192

Trust: 0.8

title:HT5190url:http://support.apple.com/kb/HT5190

Trust: 0.8

title:HT5191url:http://support.apple.com/kb/HT5191

Trust: 0.8

sources: JVNDB: JVNDB-2012-001673

EXTERNAL IDS

db:NVDid:CVE-2012-0591

Trust: 2.9

db:BIDid:52365

Trust: 1.4

db:SECUNIAid:48377

Trust: 1.2

db:SECUNIAid:48274

Trust: 1.2

db:SECUNIAid:48288

Trust: 1.2

db:OSVDBid:79913

Trust: 1.1

db:SECTRACKid:1026774

Trust: 1.1

db:JVNDBid:JVNDB-2012-001673

Trust: 0.8

db:CNNVDid:CNNVD-201203-097

Trust: 0.7

db:NSFOCUSid:19030

Trust: 0.6

db:NSFOCUSid:18990

Trust: 0.6

db:NSFOCUSid:19064

Trust: 0.6

db:APPLEid:APPLE-SA-2012-03-07-2

Trust: 0.6

db:APPLEid:APPLE-SA-2012-03-07-1

Trust: 0.6

db:VULHUBid:VHN-53872

Trust: 0.1

db:PACKETSTORMid:110644

Trust: 0.1

db:PACKETSTORMid:110650

Trust: 0.1

db:PACKETSTORMid:110590

Trust: 0.1

db:PACKETSTORMid:110779

Trust: 0.1

sources: VULHUB: VHN-53872 // BID: 52365 // JVNDB: JVNDB-2012-001673 // PACKETSTORM: 110644 // PACKETSTORM: 110650 // PACKETSTORM: 110590 // PACKETSTORM: 110779 // CNNVD: CNNVD-201203-097 // NVD: CVE-2012-0591

REFERENCES

url:http://lists.apple.com/archives/security-announce/2012/mar/msg00000.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2012/mar/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2012/mar/msg00003.html

Trust: 1.1

url:http://www.securityfocus.com/bid/52365

Trust: 1.1

url:http://osvdb.org/79913

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a17158

Trust: 1.1

url:http://www.securitytracker.com/id?1026774

Trust: 1.1

url:http://secunia.com/advisories/48274

Trust: 1.1

url:http://secunia.com/advisories/48288

Trust: 1.1

url:http://secunia.com/advisories/48377

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/73810

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0591

Trust: 0.8

url:http://jvn.jp/cert/jvnvu479643/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu341747/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu428075/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0591

Trust: 0.8

url:http://www.nsfocus.net/vulndb/19064

Trust: 0.6

url:http://www.nsfocus.net/vulndb/19030

Trust: 0.6

url:http://www.nsfocus.net/vulndb/18990

Trust: 0.6

url:http://www.apple.com/itunes/

Trust: 0.3

url:http://www.webkit.org/

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.3

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.3

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.3

url:http://support.apple.com/kb/ht5191

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48274

Trust: 0.1

url:http://secunia.com/advisories/48274/

Trust: 0.1

url:http://secunia.com/advisories/48274/#comments

Trust: 0.1

url:http://secunia.com/advisories/48288/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48288

Trust: 0.1

url:http://secunia.com/advisories/48288/

Trust: 0.1

url:http://support.apple.com/kb/ht5192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2867

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0592

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0595

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3888

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2872

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2877

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2871

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0596

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2869

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2860

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3885

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0594

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2873

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2870

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2847

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2868

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2855

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2857

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3897

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2825

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2854

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3908

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0591

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0593

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3909

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2833

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2866

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2846

Trust: 0.1

url:http://support.apple.com/kb/ht5190

Trust: 0.1

url:http://secunia.com/advisories/48377/#comments

Trust: 0.1

url:http://secunia.com/advisories/48377/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48377

Trust: 0.1

sources: VULHUB: VHN-53872 // BID: 52365 // JVNDB: JVNDB-2012-001673 // PACKETSTORM: 110644 // PACKETSTORM: 110650 // PACKETSTORM: 110590 // PACKETSTORM: 110779 // CNNVD: CNNVD-201203-097 // NVD: CVE-2012-0591

CREDITS

Dirk Schulze, Abhishek Arya (Inferno) of Google Chrome Security Team using AddressSanitizer, Cris Neckar of Google Chrome Security Team using AddressSanitizer, miaubiz, and Martin Barbella, Alexander Gavrun working with TippingPoint's Zero Day

Trust: 0.3

sources: BID: 52365

SOURCES

db:VULHUBid:VHN-53872
db:BIDid:52365
db:JVNDBid:JVNDB-2012-001673
db:PACKETSTORMid:110644
db:PACKETSTORMid:110650
db:PACKETSTORMid:110590
db:PACKETSTORMid:110779
db:CNNVDid:CNNVD-201203-097
db:NVDid:CVE-2012-0591

LAST UPDATE DATE

2025-04-11T21:20:10.230000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-53872date:2018-11-29T00:00:00
db:BIDid:52365date:2012-04-18T21:20:00
db:JVNDBid:JVNDB-2012-001673date:2012-03-21T00:00:00
db:CNNVDid:CNNVD-201203-097date:2012-04-01T00:00:00
db:NVDid:CVE-2012-0591date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-53872date:2012-03-08T00:00:00
db:BIDid:52365date:2012-03-08T00:00:00
db:JVNDBid:JVNDB-2012-001673date:2012-03-12T00:00:00
db:PACKETSTORMid:110644date:2012-03-11T05:31:55
db:PACKETSTORMid:110650date:2012-03-11T05:32:13
db:PACKETSTORMid:110590date:2012-03-08T22:22:22
db:PACKETSTORMid:110779date:2012-03-14T05:16:27
db:CNNVDid:CNNVD-201203-097date:2012-03-08T00:00:00
db:NVDid:CVE-2012-0591date:2012-03-08T22:55:02.260