ID

VAR-201306-0035


CVE

CVE-2013-1023


TITLE

Apple Safari Used in products such as WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2013-002893

DESCRIPTION

WebKit, as used in Apple Safari before 6.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2013-1009. This vulnerability CVE-2013-1009 Is a different vulnerability. Apple Safari is prone to a memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions. Versions prior to Safari 6.0.5 are vulnerable. Note: This issue was previously covered in BID 60330 (Apple Safari Prior to 6.0.5 Multiple Security Vulnerabilities) but has been given its own record to better document it. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-06-04-2 Safari 6.0.5 Safari 6.0.5 is now available and addresses the following: WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.3 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2013-0879 : Atte Kettunen of OUSPG CVE-2013-0991 : Jay Civelli of the Chromium development community CVE-2013-0992 : Google Chrome Security Team (Martin Barbella) CVE-2013-0993 : Google Chrome Security Team (Inferno) CVE-2013-0994 : David German of Google CVE-2013-0995 : Google Chrome Security Team (Inferno) CVE-2013-0996 : Google Chrome Security Team (Inferno) CVE-2013-0997 : Vitaliy Toropov working with HP's Zero Day Initiative CVE-2013-0998 : pa_kt working with HP's Zero Day Initiative CVE-2013-0999 : pa_kt working with HP's Zero Day Initiative CVE-2013-1000 : Fermin J. Serna of the Google Security Team CVE-2013-1001 : Ryan Humenick CVE-2013-1002 : Sergey Glazunov CVE-2013-1003 : Google Chrome Security Team (Inferno) CVE-2013-1004 : Google Chrome Security Team (Martin Barbella) CVE-2013-1005 : Google Chrome Security Team (Martin Barbella) CVE-2013-1006 : Google Chrome Security Team (Martin Barbella) CVE-2013-1007 : Google Chrome Security Team (Inferno) CVE-2013-1008 : Sergey Glazunov CVE-2013-1009 : Apple CVE-2013-1010 : miaubiz CVE-2013-1011 : Google Chrome Security Team (Inferno) CVE-2013-1023 : Google Chrome Security Team (Inferno) WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.3 Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-site scripting issue existed in the handling of iframes. This issue was addressed through improved origin tracking. CVE-ID CVE-2013-1012 : Subodh Iyengar and Erling Ellingsen of Facebook WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.3 Impact: Copying and pasting a malicious HTML snippet may lead to a cross-site scripting attack Description: A cross-site scripting issue existed in the handling of copied and pasted data in HTML documents. This issue was addressed through additional validation of pasted content. CVE-ID CVE-2013-0926 : Aditya Gupta, Subho Halder, and Dev Kar of xys3c (xysec.com) WebKit Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.3 Impact: Following a maliciously crafted link could lead to unexpected behavior on the target site Description: XSS Auditor may rewrite URLs to prevent cross-site scripting attacks. This may lead to a malicious alteration of the behavior of a form submission. This issue was addressed through improved validation of URLs. CVE-ID CVE-2013-1013 : Sam Power of Pentest Limited For OS X Lion systems Safari 6.0.5 is available via the Apple Software Update application. For OS X Mountain Lion systems Safari 6.0.5 is included with OS X v10.8.4. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJRrjeeAAoJEPefwLHPlZEwCm4P/3WseW2DFgYieiAHghpGQ07e /XuNWzqld4CpXyFUQDkw55DU1Y9dVIIl663rSR0VyXJDB5dMh6iHEBRHX4tarGym beZS0cDuakospFtX4MZgcKXu/8cV7b8lq9tzqH0pL419a61Fjhm1eRfDeM3snXkO kNCRi3nqOCmMroUiY+cJlKHi1x/t+2whISSM3QsIgpU5yyjEU3neMy2TPjuxC48h XZr9XaDX5cztv0MWCX+jkv+OpYPxVtPxBVw6rPLaX2eg7iwBM6yDbLF5i/4oY06t HzF2uCk8TlbFdk05Cr7HxmYV2qBei8VkcO1Mc4Ij3v3Q9iiKBRkr+d0CYQ1HSkrY igfCmfDiEpaKZfzCgwRsVFZ/UhuXTDipTFIzKrZSlbsglVyIQJtKVyyWEZDOKcYL kKCAS+ep0UyFIyeCCjFknd2hMneMR7a4u2XGJm1VtfRCA+ed3Cr0ROS+O9viGjYi Qcm+2yzlWg9vpfojv+uX+aqh6IsprhfqXuF4ypM6D98IQ3fJqx9a0tVIPniFaLuP O39M+UGtPLAw7BMiKkb4XyEajKFwJt1pfddWkC1YjKjtyRGf62BDOtY2KqEsyzpF 5nOzM3Vc+3urbur+69oqJLwRwC/PHkh1ym3LjrmqUW7+okckIGCQGt3iUwIWNKhp 2YgKISKdQYxVSfkzkqYY =jk2e -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2013-1023 // JVNDB: JVNDB-2013-002893 // BID: 60364 // VULHUB: VHN-61025 // PACKETSTORM: 121925

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:6.0

Trust: 1.9

vendor:applemodel:safariscope:lteversion:6.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 0.9

vendor:applemodel:safariscope:ltversion:6.0.5

Trust: 0.8

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:6.0.5

Trust: 0.3

vendor:applemodel:safariscope:neversion:6.0.5

Trust: 0.3

sources: BID: 60364 // JVNDB: JVNDB-2013-002893 // CNNVD: CNNVD-201306-086 // NVD: CVE-2013-1023

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1023
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-1023
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201306-086
value: MEDIUM

Trust: 0.6

VULHUB: VHN-61025
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-1023
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61025
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61025 // JVNDB: JVNDB-2013-002893 // CNNVD: CNNVD-201306-086 // NVD: CVE-2013-1023

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-61025 // JVNDB: JVNDB-2013-002893 // NVD: CVE-2013-1023

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201306-086

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201306-086

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002893

PATCH

title:APPLE-SA-2013-06-04-2url:http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html

Trust: 0.8

title:HT5785url:http://support.apple.com/kb/HT5785

Trust: 0.8

title:HT5785url:http://support.apple.com/kb/HT5785?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2013-002893

EXTERNAL IDS

db:NVDid:CVE-2013-1023

Trust: 2.9

db:JVNDBid:JVNDB-2013-002893

Trust: 0.8

db:CNNVDid:CNNVD-201306-086

Trust: 0.7

db:APPLEid:APPLE-SA-2013-06-04-2

Trust: 0.6

db:SECUNIAid:53711

Trust: 0.6

db:BIDid:60364

Trust: 0.4

db:VULHUBid:VHN-61025

Trust: 0.1

db:PACKETSTORMid:121925

Trust: 0.1

sources: VULHUB: VHN-61025 // BID: 60364 // JVNDB: JVNDB-2013-002893 // PACKETSTORM: 121925 // CNNVD: CNNVD-201306-086 // NVD: CVE-2013-1023

REFERENCES

url:http://support.apple.com/kb/ht5785

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2013/jun/msg00001.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1023

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1023

Trust: 0.8

url:http://secunia.com/advisories/53711

Trust: 0.6

url:http://www.apple.com/safari/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-0997

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0996

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0879

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1000

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1001

Trust: 0.1

url:http://support.apple.com/kb/ht1222

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0992

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1003

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1012

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1005

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1011

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1002

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0993

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1004

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0991

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1013

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0999

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1009

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0994

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1007

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0926

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0998

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1006

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1008

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1023

Trust: 0.1

sources: VULHUB: VHN-61025 // BID: 60364 // JVNDB: JVNDB-2013-002893 // PACKETSTORM: 121925 // CNNVD: CNNVD-201306-086 // NVD: CVE-2013-1023

CREDITS

Google Chrome Security Team (Inferno)

Trust: 0.3

sources: BID: 60364

SOURCES

db:VULHUBid:VHN-61025
db:BIDid:60364
db:JVNDBid:JVNDB-2013-002893
db:PACKETSTORMid:121925
db:CNNVDid:CNNVD-201306-086
db:NVDid:CVE-2013-1023

LAST UPDATE DATE

2025-04-11T19:33:09.667000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-61025date:2013-06-05T00:00:00
db:BIDid:60364date:2013-06-05T00:00:00
db:JVNDBid:JVNDB-2013-002893date:2013-06-06T00:00:00
db:CNNVDid:CNNVD-201306-086date:2013-06-06T00:00:00
db:NVDid:CVE-2013-1023date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-61025date:2013-06-05T00:00:00
db:BIDid:60364date:2013-06-05T00:00:00
db:JVNDBid:JVNDB-2013-002893date:2013-06-06T00:00:00
db:PACKETSTORMid:121925date:2013-06-06T14:44:44
db:CNNVDid:CNNVD-201306-086date:2013-06-06T00:00:00
db:NVDid:CVE-2013-1023date:2013-06-05T14:39:55.623