ID

VAR-201508-0425


CVE

CVE-2015-3781


TITLE

Apple OS X of Quick Look Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2015-004276

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Quick Look in Apple OS X before 10.10.5 allows remote attackers to inject arbitrary web script or HTML via a previously visited web site that is rendered during a Quick Look search. Apple Mac OS X is prone to multiple security vulnerabilities. Attackers can exploit these issues to execute arbitrary code with system privileges, gain admin privileges, bypass security restrictions, cause denial-of-service conditions, obtain sensitive information, and perform other attacks. Note: The issue described by CVE-2015-3778 has been removed. The issue is discussed in BID 83590 (Apple Mac OS X and iOS CVE-2015-3778 Information Disclosure Vulnerability). These issues affect OS X prior to 10.10.5. Quick Look is one of the components used to view common resource files

Trust: 1.98

sources: NVD: CVE-2015-3781 // JVNDB: JVNDB-2015-004276 // BID: 76340 // VULHUB: VHN-81742

AFFECTED PRODUCTS

vendor:applemodel:mac os xscope:lteversion:10.10.4

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:10.10 to 10.10.4

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.10.4

Trust: 0.6

vendor:applemodel:quicktimescope:eqversion:7.6

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.3.4

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7.2

Trust: 0.3

vendor:applemodel:quicktimescope:eqversion:7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3.4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.9

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.8

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.6

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.5

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2.10

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.4

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.3

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:tvscope:eqversion:4.0

Trust: 0.3

sources: BID: 76340 // JVNDB: JVNDB-2015-004276 // CNNVD: CNNVD-201508-280 // NVD: CVE-2015-3781

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3781
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-3781
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201508-280
value: MEDIUM

Trust: 0.6

VULHUB: VHN-81742
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-3781
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-81742
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-81742 // JVNDB: JVNDB-2015-004276 // CNNVD: CNNVD-201508-280 // NVD: CVE-2015-3781

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-81742 // JVNDB: JVNDB-2015-004276 // NVD: CVE-2015-3781

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201508-280

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201508-280

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-004276

PATCH

title:Apple security updatesurl:http://support.apple.com/en-us/HT1222

Trust: 0.8

title:APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006url:http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

Trust: 0.8

title:HT205031url:http://support.apple.com/en-us/HT205031

Trust: 0.8

title:HT205031url:http://support.apple.com/ja-jp/HT205031

Trust: 0.8

sources: JVNDB: JVNDB-2015-004276

EXTERNAL IDS

db:NVDid:CVE-2015-3781

Trust: 2.8

db:BIDid:76340

Trust: 2.0

db:SECTRACKid:1033276

Trust: 1.1

db:JVNid:JVNVU94440136

Trust: 0.8

db:JVNDBid:JVNDB-2015-004276

Trust: 0.8

db:CNNVDid:CNNVD-201508-280

Trust: 0.7

db:ZDIid:ZDI-15-390

Trust: 0.3

db:VULHUBid:VHN-81742

Trust: 0.1

sources: VULHUB: VHN-81742 // BID: 76340 // JVNDB: JVNDB-2015-004276 // CNNVD: CNNVD-201508-280 // NVD: CVE-2015-3781

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/aug/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/bid/76340

Trust: 1.7

url:https://support.apple.com/kb/ht205031

Trust: 1.7

url:http://www.securitytracker.com/id/1033276

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-3781

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94440136/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-3781

Trust: 0.8

url:http://www.apple.com/macosx/

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-15-390/

Trust: 0.3

url:http://prod.lists.apple.com/archives/security-announce/2015/aug/msg00004.html

Trust: 0.3

url:https://support.apple.com/en-ie/ht205031

Trust: 0.3

sources: VULHUB: VHN-81742 // BID: 76340 // JVNDB: JVNDB-2015-004276 // CNNVD: CNNVD-201508-280 // NVD: CVE-2015-3781

CREDITS

An anonymous researcher working with HP's Zero Day Initiative, Jeffrey Paul of EEQJ, Jan Bee of the Google Security Team, Maxime VILLARD of m00nbsd, Ryan Pentney and Richard Johnson of Cisco Talos, Xiaoyong Wu of the Evernote Security Team, JieTao Yang of KeenTeam

Trust: 0.6

sources: CNNVD: CNNVD-201508-280

SOURCES

db:VULHUBid:VHN-81742
db:BIDid:76340
db:JVNDBid:JVNDB-2015-004276
db:CNNVDid:CNNVD-201508-280
db:NVDid:CVE-2015-3781

LAST UPDATE DATE

2025-04-13T21:17:38.467000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-81742date:2017-09-21T00:00:00
db:BIDid:76340date:2016-07-05T21:35:00
db:JVNDBid:JVNDB-2015-004276date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-280date:2015-08-18T00:00:00
db:NVDid:CVE-2015-3781date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:VULHUBid:VHN-81742date:2015-08-16T00:00:00
db:BIDid:76340date:2015-08-13T00:00:00
db:JVNDBid:JVNDB-2015-004276date:2015-08-21T00:00:00
db:CNNVDid:CNNVD-201508-280date:2015-08-18T00:00:00
db:NVDid:CVE-2015-3781date:2015-08-16T23:59:54.050