ID

VAR-200801-0014


CVE

CVE-2008-0035


TITLE

plural Apple Product of Foundation Memory corruption vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2008-001033

DESCRIPTION

Unspecified vulnerability in Foundation, as used in Apple iPhone 1.0 through 1.1.2, iPod touch 1.1 through 1.1.2, and Mac OS X 10.5 through 10.5.1, allows remote attackers to cause a denial of service (application termination) or execute arbitrary code via a crafted URL that triggers memory corruption in Safari. Apple Safari for iPhone and iPod Touch is prone to a remote code-execution vulnerability because it fails to adequately sanitize user-supplied input. An attacker may exploit this issue by enticing victims into viewing a maliciously crafted URI. Successfully exploiting this issue can allow attackers to crash the application or to execute arbitrary code in the context of the affected application. This issue affects iPhone v1.0 to v1.1.2 and iPod Touch v1.1 to v1.1.2. The iPod touch (also known as iTouch) is an MP4 player released by Apple, and the iPhone is a smartphone released by it. Remote attackers may use this vulnerability to control the user's system. 2) An error in the handling of emergency calls can be exploited to bypass the Passcode Lock feature and allows users with physical access to an iPhone to launch applications without the passcode. For more information see vulnerability #21 in: SA28136 SOLUTION: Update to version 1.1.3 (downloadable and installable via iTunes). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. I. Further details are available in the US-CERT Vulnerability Notes Database. These products include Samba and X11. II. Impact The impacts of these vulnerabilities vary. III. These and other updates are available via Software Update or via Apple Downloads. IV. Please send email to <cert@cert.org> with "TA08-043B Feedback VU#774345" in the subject. ____________________________________________________________________ For instructions on subscribing to or unsubscribing from this mailing list, visit <http://www.us-cert.gov/cas/signup.html>. ____________________________________________________________________ Produced 2008 by US-CERT, a government organization. Terms of use: <http://www.us-cert.gov/legal.html> ____________________________________________________________________ Revision History February 12, 2008: Initial release -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) iQEVAwUBR7HyXPRFkHkM87XOAQLgawf/WfBp5mjT+DZriprWRqe1HM4Z9SSe/5Dg jMgSlX1j/YJC7FgZfjJvriQ+yXeOnhwvKggfTbkJWej+0AeRbyIUFWD/ZTh2Qylp /1vBehJW9nhT2yMT65/gT/MnbArN11AILkfSGr4W6xLPMR2zq0HsrP2SxYlAVkSO PPlo0KhWWATcjHjJEacdmry4fR6iv6xA0gFjWN6i18VX5LSMOEyO3LpDt+Rk8fet r7Pwi/QEr/nipEEw8R8Jg9+LT8dqQL1t+yhTa5pV1rceuEb3Cz67paHAqRneldW9 SAl/TPznmYCCMHqyOfHdRBUVvOxI09OPjHYkf7ghv5e06LqbfVMZug== =qwP5 -----END PGP SIGNATURE----- . ---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Apple Mac OS X Security Update Fixes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA28891 VERIFY ADVISORY: http://secunia.com/advisories/28891/ CRITICAL: Highly critical IMPACT: Security Bypass, Exposure of system information, Privilege escalation, DoS, System access WHERE: >From remote OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/ DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities and weaknesses. 1) An unspecified error exists within Foundation in Safari's handling of URLs. This can be exploited to cause a memory corruption when a user is enticed to access a specially crafted URL. Successful exploitation may allow execution of arbitrary code. 2) A weakness exists due to Launch Services allowing users to start uninstalled applications from a Time Machine Backup. 3) An error in the handling of file:// URLs in Mail can be exploited to execute arbitrary applications without warning when a user is enticed to click on a URL within a message. 4) An unspecified error exists within NFS when handling mbuf chains. This can be exploited to cause a memory corruption and allows a system shutdown and potential execution of arbitrary code. 5) The problem is that Parental Controls contacts www.apple.com when a site is unblocked and allows for detection of computers running Parental Controls. 6) A boundary error in Samba can be exploited by malicious people to compromise a vulnerable system. For more information: SA27760 7) An input validation error exists in Terminal when processing URL schemes. 8) Multiple vulnerabilities in X11 X Font Server can be exploited by malicious, local users to gain escalated privileges. For more information: SA27040 9) An error exists in X11, which causes certain settings ("Allow connections from network client") not to be applied. SOLUTION: Update to Mac OS X 10.5.2 or apply Security Update 2008-001. Security Update 2008-001 (PPC): http://www.apple.com/support/downloads/securityupdate2008001ppc.html Security Update 2008-001 (Universal): http://www.apple.com/support/downloads/securityupdate2008001universal.html Mac OS X 10.5.2 Combo Update: http://www.apple.com/support/downloads/macosx1052comboupdate.html Mac OS X Server 10.5.2 Combo Update: http://www.apple.com/support/downloads/macosxserver1052comboupdate.html PROVIDED AND/OR DISCOVERED BY: 2) The vendor credits Steven Fisher of Discovery Software Ltd. and Ian Coutier. 4) The vendor credits Oleg Drokin, Sun Microsystems. 5) The vendor credits Jesse Pearson. 6) Alin Rad Pop, Secunia Research. 7) The vendor credits Olli Leppanen of Digital Film Finland, and Brian Mastenbrook. ORIGINAL ADVISORY: Apple: http://docs.info.apple.com/article.html?artnum=307430 OTHER REFERENCES: SA27040: http://secunia.com/advisories/27040/ SA27760: http://secunia.com/advisories/27760/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.34

sources: NVD: CVE-2008-0035 // JVNDB: JVNDB-2008-001033 // BID: 27296 // VULHUB: VHN-30160 // VULMON: CVE-2008-0035 // PACKETSTORM: 62684 // PACKETSTORM: 63540 // PACKETSTORM: 63584

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:*

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.5

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.1

Trust: 0.8

vendor:applemodel:iphonescope:eqversion:v1.0 to v1.1.2 version

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:v1.1 to v1.1.2 version

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:10.5

Trust: 0.6

vendor:applemodel:mac os xscope:eqversion:10.5.1

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.5.2

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.5.2

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:1.1.3

Trust: 0.3

vendor:applemodel:iphonescope:neversion:1.1.3

Trust: 0.3

sources: BID: 27296 // JVNDB: JVNDB-2008-001033 // CNNVD: CNNVD-200801-210 // NVD: CVE-2008-0035

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-0035
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-0035
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200801-210
value: CRITICAL

Trust: 0.6

VULHUB: VHN-30160
value: MEDIUM

Trust: 0.1

VULMON: CVE-2008-0035
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-0035
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-30160
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-30160 // VULMON: CVE-2008-0035 // JVNDB: JVNDB-2008-001033 // CNNVD: CNNVD-200801-210 // NVD: CVE-2008-0035

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-30160 // JVNDB: JVNDB-2008-001033 // NVD: CVE-2008-0035

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200801-210

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200801-210

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001033

PATCH

title:Security Update 2008-001url:http://docs.info.apple.com/article.html?artnum=307430-en

Trust: 0.8

title:iPhone v1.1.3 and iPod touch v1.1.3url:http://docs.info.apple.com/article.html?artnum=307302-en

Trust: 0.8

title:iPhone v1.1.3 and iPod touch v1.1.3url:http://docs.info.apple.com/article.html?artnum=307302-ja

Trust: 0.8

title:Security Update 2008-001url:http://docs.info.apple.com/article.html?artnum=307430-ja

Trust: 0.8

title:TA08-043Burl:http://software.fujitsu.com/jp/security/vulnerabilities/ta08-043b.html

Trust: 0.8

sources: JVNDB: JVNDB-2008-001033

EXTERNAL IDS

db:NVDid:CVE-2008-0035

Trust: 2.9

db:BIDid:27296

Trust: 2.9

db:SECUNIAid:28497

Trust: 2.7

db:USCERTid:TA08-043B

Trust: 2.7

db:SECTRACKid:1019220

Trust: 2.5

db:SECUNIAid:28891

Trust: 1.9

db:VUPENid:ADV-2008-0147

Trust: 1.7

db:VUPENid:ADV-2008-0495

Trust: 1.7

db:XFid:39700

Trust: 0.8

db:USCERTid:SA08-043B

Trust: 0.8

db:JVNDBid:JVNDB-2008-001033

Trust: 0.8

db:CNNVDid:CNNVD-200801-210

Trust: 0.7

db:VULHUBid:VHN-30160

Trust: 0.1

db:VUPENid:2008/0495

Trust: 0.1

db:VUPENid:2008/0147

Trust: 0.1

db:VULMONid:CVE-2008-0035

Trust: 0.1

db:PACKETSTORMid:62684

Trust: 0.1

db:PACKETSTORMid:63540

Trust: 0.1

db:PACKETSTORMid:63584

Trust: 0.1

sources: VULHUB: VHN-30160 // VULMON: CVE-2008-0035 // BID: 27296 // JVNDB: JVNDB-2008-001033 // PACKETSTORM: 62684 // PACKETSTORM: 63540 // PACKETSTORM: 63584 // CNNVD: CNNVD-200801-210 // NVD: CVE-2008-0035

REFERENCES

url:http://www.securityfocus.com/bid/27296

Trust: 2.6

url:http://www.us-cert.gov/cas/techalerts/ta08-043b.html

Trust: 2.6

url:http://www.securitytracker.com/id?1019220

Trust: 2.6

url:http://secunia.com/advisories/28497

Trust: 2.6

url:http://docs.info.apple.com/article.html?artnum=307302

Trust: 2.2

url:http://docs.info.apple.com/article.html?artnum=307430

Trust: 2.2

url:http://lists.apple.com/archives/security-announce/2008/jan/msg00000.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2008/feb/msg00002.html

Trust: 1.8

url:http://secunia.com/advisories/28891

Trust: 1.8

url:http://www.vupen.com/english/advisories/2008/0147

Trust: 1.8

url:http://www.vupen.com/english/advisories/2008/0495/references

Trust: 1.8

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/39700

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-0035

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/0147

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/39700

Trust: 0.8

url:http://jvn.jp/cert/jvnta08-043b/index.html

Trust: 0.8

url:http://jvn.jp/tr/trta08-043b/index.html

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-0035

Trust: 0.8

url:http://www.us-cert.gov/cas/alerts/sa08-043b.html

Trust: 0.8

url:http://software.cisco.com/download/navigator.html?mdfid=283613663

Trust: 0.3

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/about_secunia_advisories/

Trust: 0.2

url:https://psi.secunia.com/?page=changelog

Trust: 0.2

url:https://psi.secunia.com/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/product/15128/

Trust: 0.1

url:http://secunia.com/advisories/28497/

Trust: 0.1

url:http://secunia.com/advisories/28136/

Trust: 0.1

url:http://secunia.com/product/16074/

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=307109>

Trust: 0.1

url:http://www.samba.org/samba/history/security.html>

Trust: 0.1

url:http://www.us-cert.gov/cas/techalerts/ta08-043b.html>

Trust: 0.1

url:http://www.x.org/wiki/development/security>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=307430>

Trust: 0.1

url:http://www.apple.com/support/downloads/>

Trust: 0.1

url:http://docs.info.apple.com/article.html?artnum=106704>

Trust: 0.1

url:http://www.us-cert.gov/cas/signup.html>.

Trust: 0.1

url:http://www.us-cert.gov/legal.html>

Trust: 0.1

url:http://www.kb.cert.org/vuls/byid?searchview&query=apple_security_update_2008_001>

Trust: 0.1

url:http://www.apple.com/support/downloads/macosx1052comboupdate.html

Trust: 0.1

url:http://secunia.com/advisories/27760/

Trust: 0.1

url:http://secunia.com/advisories/27040/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008001universal.html

Trust: 0.1

url:http://secunia.com/product/96/

Trust: 0.1

url:http://www.apple.com/support/downloads/securityupdate2008001ppc.html

Trust: 0.1

url:http://secunia.com/advisories/28891/

Trust: 0.1

url:http://www.apple.com/support/downloads/macosxserver1052comboupdate.html

Trust: 0.1

sources: VULHUB: VHN-30160 // VULMON: CVE-2008-0035 // BID: 27296 // JVNDB: JVNDB-2008-001033 // PACKETSTORM: 62684 // PACKETSTORM: 63540 // PACKETSTORM: 63584 // CNNVD: CNNVD-200801-210 // NVD: CVE-2008-0035

CREDITS

Apple

Trust: 0.6

sources: CNNVD: CNNVD-200801-210

SOURCES

db:VULHUBid:VHN-30160
db:VULMONid:CVE-2008-0035
db:BIDid:27296
db:JVNDBid:JVNDB-2008-001033
db:PACKETSTORMid:62684
db:PACKETSTORMid:63540
db:PACKETSTORMid:63584
db:CNNVDid:CNNVD-200801-210
db:NVDid:CVE-2008-0035

LAST UPDATE DATE

2024-11-23T19:43:21.072000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-30160date:2017-08-08T00:00:00
db:VULMONid:CVE-2008-0035date:2017-08-08T00:00:00
db:BIDid:27296date:2008-02-12T00:06:00
db:JVNDBid:JVNDB-2008-001033date:2008-02-25T00:00:00
db:CNNVDid:CNNVD-200801-210date:2022-08-10T00:00:00
db:NVDid:CVE-2008-0035date:2024-11-21T00:41:00.647

SOURCES RELEASE DATE

db:VULHUBid:VHN-30160date:2008-01-16T00:00:00
db:VULMONid:CVE-2008-0035date:2008-01-16T00:00:00
db:BIDid:27296date:2008-01-15T00:00:00
db:JVNDBid:JVNDB-2008-001033date:2008-01-30T00:00:00
db:PACKETSTORMid:62684date:2008-01-17T04:45:41
db:PACKETSTORMid:63540date:2008-02-12T22:23:40
db:PACKETSTORMid:63584date:2008-02-13T21:32:17
db:CNNVDid:CNNVD-200801-210date:2008-01-15T00:00:00
db:NVDid:CVE-2008-0035date:2008-01-16T02:00:00