ID

VAR-200604-0537


CVE

CVE-2006-2019


TITLE

Apple Safari Web Browser Rowspan Denial Of Service Vulnerability

Trust: 0.9

sources: BID: 17674 // CNNVD: CNNVD-200604-451

DESCRIPTION

Apple Mac OS X Safari 2.0.3, 1.3.1, and possibly other versions allows remote attackers to cause a denial of service (CPU consumption and crash) via a TD element with a large number in the rowspan attribute. Apple Mac OS X of Safari There is a service disruption (DoS) There are vulnerabilities that are put into a state.Service disruption by a third party (DoS) There is a possibility of being put into a state. Apple Safari web browser is prone to a denial-of-service vulnerability. An attacker can exploit this issue to consume excessive system resources and eventually crash an affected browser. Safari opening malicious HTML files may cause the operating system to slow down SRCOD (Spinning Rainbow Cursor Of Death), so that no application can be launched to kill the process. Safari will crash after a few minutes. TITLE: Safari "rowspan" Attribute Denial of Service Vulnerability SECUNIA ADVISORY ID: SA19763 VERIFY ADVISORY: http://secunia.com/advisories/19763/ CRITICAL: Not critical IMPACT: DoS WHERE: >From remote SOFTWARE: Safari 1.x http://secunia.com/product/1543/ Safari 2.x http://secunia.com/product/5289/ DESCRIPTION: Yannick von Arx has discovered a vulnerability in Safari, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the processing of "td" HTML tags with overly large values for the "rowspan" attribute. This can be exploited to consume a large amount of CPU and memory resources on a vulnerable system by tricking a user into visiting a malicious web site. Successful exploitation causes a vulnerable system to become unresponsive. The vulnerability has been confirmed in version 2.0.3 (417.9.2) and has also been reported in version 1.3.1 (312.3.1). Other versions may also be affected. SOLUTION: Do not visit untrusted web sites while working with unsaved sensitive information. PROVIDED AND/OR DISCOVERED BY: Yannick von Arx ORIGINAL ADVISORY: http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/045472.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2006-2019 // JVNDB: JVNDB-2006-003767 // BID: 17674 // VULHUB: VHN-18127 // PACKETSTORM: 45675

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:2.0.3 and 1.3.1

Trust: 0.8

sources: BID: 17674 // JVNDB: JVNDB-2006-003767 // CNNVD: CNNVD-200604-451 // NVD: CVE-2006-2019

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2006-2019
value: MEDIUM

Trust: 1.0

NVD: CVE-2006-2019
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200604-451
value: MEDIUM

Trust: 0.6

VULHUB: VHN-18127
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2006-2019
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-18127
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-18127 // JVNDB: JVNDB-2006-003767 // CNNVD: CNNVD-200604-451 // NVD: CVE-2006-2019

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2006-2019

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200604-451

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200604-451

CONFIGURATIONS

sources: JVNDB: JVNDB-2006-003767

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-18127

EXTERNAL IDS

db:NVDid:CVE-2006-2019

Trust: 2.5

db:BIDid:17674

Trust: 2.0

db:SECUNIAid:19763

Trust: 1.8

db:SECTRACKid:1015982

Trust: 1.7

db:VUPENid:ADV-2006-1508

Trust: 1.7

db:EXPLOIT-DBid:1715

Trust: 1.7

db:JVNDBid:JVNDB-2006-003767

Trust: 0.8

db:CNNVDid:CNNVD-200604-451

Trust: 0.7

db:MILW0RMid:1715

Trust: 0.6

db:XFid:25998

Trust: 0.6

db:FULLDISCid:20060424 APPLE MAC OS X SAFARI 2.0.3 VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20060424 RE: APPLE MAC OS X SAFARI 2.0.3 VULNERABILITY

Trust: 0.6

db:BUGTRAQid:20060424 APPLE MAC OS X SAFARI 2.0.3 VULNERABILITY

Trust: 0.6

db:SEEBUGid:SSVID-63498

Trust: 0.1

db:VULHUBid:VHN-18127

Trust: 0.1

db:PACKETSTORMid:45675

Trust: 0.1

sources: VULHUB: VHN-18127 // BID: 17674 // JVNDB: JVNDB-2006-003767 // PACKETSTORM: 45675 // CNNVD: CNNVD-200604-451 // NVD: CVE-2006-2019

REFERENCES

url:http://lists.grok.org.uk/pipermail/full-disclosure/2006-april/045472.html

Trust: 1.8

url:http://www.securityfocus.com/bid/17674

Trust: 1.7

url:http://securitytracker.com/id?1015982

Trust: 1.7

url:http://secunia.com/advisories/19763

Trust: 1.7

url:http://www.securityfocus.com/archive/1/431874/100/0/threaded

Trust: 1.1

url:http://www.securityfocus.com/archive/1/431944/100/0/threaded

Trust: 1.1

url:https://www.exploit-db.com/exploits/1715

Trust: 1.1

url:http://www.vupen.com/english/advisories/2006/1508

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/25998

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2019

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-2019

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/431944/100/0/threaded

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/431874/100/0/threaded

Trust: 0.6

url:http://www.frsirt.com/english/advisories/2006/1508

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/25998

Trust: 0.6

url:http://www.milw0rm.com/exploits/1715

Trust: 0.6

url:http://milw0rm.com/exploits/1715

Trust: 0.6

url:http://browserfun.blogspot.com/2006/07/mobb-5-dhtml-setattributenode.html

Trust: 0.3

url:http://www.yanux.ch/exploits/safari/bugreport_imac_g4.txt

Trust: 0.3

url:http://www.apple.com/safari/

Trust: 0.3

url:/archive/1/431944

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/19763/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/product/1543/

Trust: 0.1

url:http://secunia.com/product/5289/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-18127 // BID: 17674 // JVNDB: JVNDB-2006-003767 // PACKETSTORM: 45675 // CNNVD: CNNVD-200604-451 // NVD: CVE-2006-2019

CREDITS

Yannick von Arx yannick.vonarx@yanux.ch

Trust: 0.6

sources: CNNVD: CNNVD-200604-451

SOURCES

db:VULHUBid:VHN-18127
db:BIDid:17674
db:JVNDBid:JVNDB-2006-003767
db:PACKETSTORMid:45675
db:CNNVDid:CNNVD-200604-451
db:NVDid:CVE-2006-2019

LAST UPDATE DATE

2024-08-14T15:14:57.098000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-18127date:2018-10-18T00:00:00
db:BIDid:17674date:2006-04-24T23:26:00
db:JVNDBid:JVNDB-2006-003767date:2013-12-26T00:00:00
db:CNNVDid:CNNVD-200604-451date:2006-04-26T00:00:00
db:NVDid:CVE-2006-2019date:2018-10-18T16:37:41.410

SOURCES RELEASE DATE

db:VULHUBid:VHN-18127date:2006-04-25T00:00:00
db:BIDid:17674date:2006-04-24T00:00:00
db:JVNDBid:JVNDB-2006-003767date:2013-12-26T00:00:00
db:PACKETSTORMid:45675date:2006-04-25T22:06:23
db:CNNVDid:CNNVD-200604-451date:2006-04-25T00:00:00
db:NVDid:CVE-2006-2019date:2006-04-25T17:06:00