ID

VAR-201205-0407


CVE

CVE-2012-0674


TITLE

Apple iOS of Safari In the location bar URL Forged vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2012-002246

DESCRIPTION

Safari in Apple iOS before 5.1.1 allows remote attackers to spoof the location bar's URL via a crafted web site. Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. The vulnerability exists in versions of Safari prior to Apple iOS 5.1.1. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2012-05-07-1 iOS 5.1.1 Software Update iOS 5.1.1 Software Update is now available and addresses the following: Safari Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: A maliciously crafted website may be able to spoof the address in the location bar Description: A URL spoofing issue existed in Safari. This could be used in a malicious web site to direct the user to a spoofed site that visually appeared to be a legitimate domain. This issue is addressed through improved URL handling. This issue does not affect OS X systems. CVE-ID CVE-2012-0674 : David Vieira-Kurz of MajorSecurity (majorsecurity.net) WebKit Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: Multiple cross-site scripting issues existed in WebKit. CVE-ID CVE-2011-3046 : Sergey Glazunov working with Google's Pwnium contest CVE-2011-3056 : Sergey Glazunov WebKit Available for: iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in WebKit. CVE-ID CVE-2012-0672 : Adam Barth and Abhishek Arya of the Google Chrome Security Team Installation note: This update is only available through iTunes, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes will automatically check Apple's update server on its weekly schedule. When an update is detected, it will download it. When the iPhone, iPod touch or iPad is docked, iTunes will present the user with the option to install the update. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iPhone, iPod touch, or iPad. The automatic update process may take up to a week depending on the day that iTunes checks for updates. You may manually obtain the update via the Check for Updates button within iTunes. After doing this, the update can be applied when your iPhone, iPod touch, or iPad is docked to your computer. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "5.1.1". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.16 (Darwin) iQEcBAEBAgAGBQJPpBcyAAoJEGnF2JsdZQeexJYH/0aYO0MULFXYARidSV22JdjG a1+yXKn8Rv2vv+8yStgKK2mWu18hvYWQ+whtvCzs1OefiVsq1nOvdCL1G62ybcYv O9BiHEDsuu+On2nAPiglu+luokByKLlZcIaM1Qa3pXHkiI8jlH7y7XuuoFsVt1Vc 284JgvV/sHnvesne2GsNyoRBJjfkliqXCgb1zmQWO9xX7HEJCaMNlc5Bwdonm26q 3OEKr2UQxvmWCbnCroiQ5KmEM+gLJSfLLOymow9xa4gM8aM87BXGWNMEKVs8LRLm dHngmEmzEa/Fx9PnR7rqjTCAMS8hR7aFcCYNTWjfR+keRXx7OHhCm88MfndryS8= =qhqL -----END PGP SIGNATURE-----

Trust: 1.8

sources: NVD: CVE-2012-0674 // JVNDB: JVNDB-2012-002246 // VULHUB: VHN-53955 // PACKETSTORM: 112543

AFFECTED PRODUCTS

vendor:applemodel:iphone osscope:eqversion:5.0

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:5.0.1

Trust: 1.6

vendor:applemodel:iphone osscope:eqversion:4.3.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2

Trust: 1.0

vendor:applemodel:iphone osscope:lteversion:5.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.3

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.5

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.0.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.2.2

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.0

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.8

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:4.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:iosscope:ltversion:5.1.1

Trust: 0.8

vendor:applemodel:ipadscope: - version: -

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:iphone osscope:eqversion:5.1

Trust: 0.6

sources: JVNDB: JVNDB-2012-002246 // CNNVD: CNNVD-201205-129 // NVD: CVE-2012-0674

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-0674
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-0674
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201205-129
value: MEDIUM

Trust: 0.6

VULHUB: VHN-53955
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-0674
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-53955
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-53955 // JVNDB: JVNDB-2012-002246 // CNNVD: CNNVD-201205-129 // NVD: CVE-2012-0674

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-53955 // JVNDB: JVNDB-2012-002246 // NVD: CVE-2012-0674

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201205-129

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201205-129

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-002246

PATCH

title:HT5278url:http://support.apple.com/kb/HT5278

Trust: 0.8

sources: JVNDB: JVNDB-2012-002246

EXTERNAL IDS

db:NVDid:CVE-2012-0674

Trust: 2.6

db:JVNDBid:JVNDB-2012-002246

Trust: 0.8

db:CNNVDid:CNNVD-201205-129

Trust: 0.7

db:APPLEid:APPLE-SA-2012-05-07-1

Trust: 0.6

db:PACKETSTORMid:112543

Trust: 0.2

db:VULHUBid:VHN-53955

Trust: 0.1

sources: VULHUB: VHN-53955 // JVNDB: JVNDB-2012-002246 // PACKETSTORM: 112543 // CNNVD: CNNVD-201205-129 // NVD: CVE-2012-0674

REFERENCES

url:http://lists.apple.com/archives/security-announce/2012/may/msg00000.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-0674

Trust: 0.8

url:http://jvn.jp/cert/jvnvu341483

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-0674

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2012-0672

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0674

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3046

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3056

Trust: 0.1

sources: VULHUB: VHN-53955 // JVNDB: JVNDB-2012-002246 // PACKETSTORM: 112543 // CNNVD: CNNVD-201205-129 // NVD: CVE-2012-0674

CREDITS

Apple

Trust: 0.1

sources: PACKETSTORM: 112543

SOURCES

db:VULHUBid:VHN-53955
db:JVNDBid:JVNDB-2012-002246
db:PACKETSTORMid:112543
db:CNNVDid:CNNVD-201205-129
db:NVDid:CVE-2012-0674

LAST UPDATE DATE

2025-04-11T19:36:54.708000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-53955date:2012-05-08T00:00:00
db:JVNDBid:JVNDB-2012-002246date:2012-05-09T00:00:00
db:CNNVDid:CNNVD-201205-129date:2012-05-09T00:00:00
db:NVDid:CVE-2012-0674date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-53955date:2012-05-08T00:00:00
db:JVNDBid:JVNDB-2012-002246date:2012-05-09T00:00:00
db:PACKETSTORMid:112543date:2012-05-08T19:11:11
db:CNNVDid:CNNVD-201205-129date:2012-05-09T00:00:00
db:NVDid:CVE-2012-0674date:2012-05-08T10:25:47.020