ID

VAR-200804-0038


CVE

CVE-2008-1025


TITLE

Apple Safari WebKit fails to properly handle a crafted URL

Trust: 0.8

sources: CERT/CC: VU#705529

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Apple WebKit, as used in Safari before 3.1.1, allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a colon in the hostname portion. A vulnerability in the way Apple Mac OS X handles specially crafted URLs may allow an attacker to execute script in the context of another site.. A vulnerability in a common PHP extension module could allow a remote attacker to execute code on a vulnerable system. Attackers may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow attackers to steal cookie-based authentication credentials and to launch other attacks. This issue affects versions prior to Apple Safari 3.1.1 running on the following platforms: Mac OS X 10.4.11 Mac OS X 10.5.2 Windows XP Windows Vista. Safari is the WEB browser bundled with the Apple family operating system by default. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: phpPgAds XML-RPC PHP Code Execution Vulnerability SECUNIA ADVISORY ID: SA15884 VERIFY ADVISORY: http://secunia.com/advisories/15884/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: phpPgAds 2.x http://secunia.com/product/4577/ DESCRIPTION: A vulnerability has been reported in phpPgAds, which can be exploited by malicious people to compromise a vulnerable system. For more information: SA15852 SOLUTION: Update to version 2.0.5. http://sourceforge.net/project/showfiles.php?group_id=36679 OTHER REFERENCES: SA15852: http://secunia.com/advisories/15852/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 3.51

sources: NVD: CVE-2008-1025 // CERT/CC: VU#705529 // CERT/CC: VU#442845 // JVNDB: JVNDB-2008-001321 // BID: 28814 // VULHUB: VHN-31150 // PACKETSTORM: 38390

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 1.9

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:3.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:3.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3.0.4

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3.0.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:3.0.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:2.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.3

Trust: 1.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:1.0

Trust: 1.3

vendor:applemodel:safariscope:eqversion:0.9

Trust: 1.0

vendor:applemodel:webkitscope:eqversion:*

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:0.8

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 1.0

vendor:apple computermodel: - scope: - version: -

Trust: 0.8

vendor:drupalmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:pear xml rpcmodel: - scope: - version: -

Trust: 0.8

vendor:phpxmlrpcmodel: - scope: - version: -

Trust: 0.8

vendor:postnukemodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:serendipitymodel: - scope: - version: -

Trust: 0.8

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:wordpressmodel: - scope: - version: -

Trust: 0.8

vendor:xoopsmodel: - scope: - version: -

Trust: 0.8

vendor:phpmyfaqmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:safariscope:ltversion:version

Trust: 0.8

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.8

vendor:applemodel:webkitscope: - version: -

Trust: 0.6

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:applemodel:safariscope:neversion:3.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:neversion:2.0

Trust: 0.3

sources: CERT/CC: VU#705529 // CERT/CC: VU#442845 // BID: 28814 // JVNDB: JVNDB-2008-001321 // CNNVD: CNNVD-200804-273 // NVD: CVE-2008-1025

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1025
value: MEDIUM

Trust: 1.0

CARNEGIE MELLON: VU#705529
value: 9.90

Trust: 0.8

CARNEGIE MELLON: VU#442845
value: 20.75

Trust: 0.8

NVD: CVE-2008-1025
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200804-273
value: MEDIUM

Trust: 0.6

VULHUB: VHN-31150
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1025
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31150
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#705529 // CERT/CC: VU#442845 // VULHUB: VHN-31150 // JVNDB: JVNDB-2008-001321 // CNNVD: CNNVD-200804-273 // NVD: CVE-2008-1025

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-31150 // JVNDB: JVNDB-2008-001321 // NVD: CVE-2008-1025

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200804-273

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-200804-273

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001321

PATCH

title:iPhone v2.0 and iPod touch v2.0url:http://support.apple.com/kb/HT2351

Trust: 0.8

title:Safari 3.1.1url:http://support.apple.com/kb/HT1467

Trust: 0.8

title:Safari 3.1.1url:http://support.apple.com/kb/HT1467?viewlocale=ja_JP

Trust: 0.8

title:iPhone v2.0 and iPod touch v2.0url:http://support.apple.com/kb/HT2351?viewlocale=ja_JP&locale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001321

EXTERNAL IDS

db:CERT/CCid:VU#705529

Trust: 3.3

db:NVDid:CVE-2008-1025

Trust: 2.8

db:BIDid:28814

Trust: 2.8

db:SECUNIAid:29846

Trust: 2.5

db:SECTRACKid:1019869

Trust: 2.5

db:SECUNIAid:31074

Trust: 1.7

db:VUPENid:ADV-2008-2094

Trust: 1.7

db:VUPENid:ADV-2008-1250

Trust: 1.7

db:XFid:41862

Trust: 1.4

db:SECUNIAid:15884

Trust: 0.9

db:SECUNIAid:15810

Trust: 0.8

db:SECUNIAid:15922

Trust: 0.8

db:SECUNIAid:15852

Trust: 0.8

db:SECUNIAid:15855

Trust: 0.8

db:SECUNIAid:15861

Trust: 0.8

db:SECUNIAid:15862

Trust: 0.8

db:SECUNIAid:15872

Trust: 0.8

db:SECUNIAid:15883

Trust: 0.8

db:SECUNIAid:15895

Trust: 0.8

db:BIDid:14088

Trust: 0.8

db:SECTRACKid:1014327

Trust: 0.8

db:CERT/CCid:VU#442845

Trust: 0.8

db:JVNDBid:JVNDB-2008-001321

Trust: 0.8

db:CNNVDid:CNNVD-200804-273

Trust: 0.7

db:APPLEid:APPLE-SA-2008-07-11

Trust: 0.6

db:APPLEid:APPLE-SA-2008-04-16

Trust: 0.6

db:VULHUBid:VHN-31150

Trust: 0.1

db:PACKETSTORMid:38390

Trust: 0.1

sources: CERT/CC: VU#705529 // CERT/CC: VU#442845 // VULHUB: VHN-31150 // BID: 28814 // JVNDB: JVNDB-2008-001321 // PACKETSTORM: 38390 // CNNVD: CNNVD-200804-273 // NVD: CVE-2008-1025

REFERENCES

url:http://www.securityfocus.com/bid/28814

Trust: 2.5

url:http://www.kb.cert.org/vuls/id/705529

Trust: 2.5

url:http://www.securitytracker.com/id?1019869

Trust: 2.5

url:http://secunia.com/advisories/29846

Trust: 2.5

url:http://support.apple.com/kb/ht1467

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2008/apr/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2008//jul/msg00001.html

Trust: 1.7

url:http://secunia.com/advisories/31074

Trust: 1.7

url:http://www.frsirt.com/english/advisories/2008/1250/references

Trust: 1.4

url:http://xforce.iss.net/xforce/xfdb/41862

Trust: 1.4

url:http://www.vupen.com/english/advisories/2008/1250/references

Trust: 1.1

url:http://www.vupen.com/english/advisories/2008/2094/references

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/41862

Trust: 1.1

url:http://secunia.com/advisories/15884/

Trust: 0.9

url:http://secunia.com/advisories/15852/

Trust: 0.9

url:about vulnerability notes

Trust: 0.8

url:contact us about this vulnerability

Trust: 0.8

url:provide a vendor statement

Trust: 0.8

url:http://www.hardened-php.net/advisory-022005.php

Trust: 0.8

url:http://secunia.com/advisories/15861/

Trust: 0.8

url:http://secunia.com/advisories/15862/

Trust: 0.8

url:http://secunia.com/advisories/15895/

Trust: 0.8

url:http://secunia.com/advisories/15883/

Trust: 0.8

url:http://news.postnuke.com/modules.php?op=modload&name=news&file=article&sid=2699

Trust: 0.8

url:http://secunia.com/advisories/15855/

Trust: 0.8

url:http://secunia.com/advisories/15810/

Trust: 0.8

url:http://secunia.com/advisories/15872/

Trust: 0.8

url:http://secunia.com/advisories/15922/

Trust: 0.8

url:http://securitytracker.com/alerts/2005/jun/1014327.html

Trust: 0.8

url:http://www.gulftech.org/?node=research&article_id=00088-07022005

Trust: 0.8

url:http://www.gulftech.org/?node=research&article_id=00087-07012005

Trust: 0.8

url:http://www.securityfocus.com/bid/14088

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1025

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1025

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2008/2094/references

Trust: 0.6

url:http://www.apple.com/safari/

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4577/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://sourceforge.net/project/showfiles.php?group_id=36679

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: CERT/CC: VU#705529 // CERT/CC: VU#442845 // VULHUB: VHN-31150 // BID: 28814 // JVNDB: JVNDB-2008-001321 // PACKETSTORM: 38390 // CNNVD: CNNVD-200804-273 // NVD: CVE-2008-1025

CREDITS

Robert Swiecki robert@swiecki.net

Trust: 0.6

sources: CNNVD: CNNVD-200804-273

SOURCES

db:CERT/CCid:VU#705529
db:CERT/CCid:VU#442845
db:VULHUBid:VHN-31150
db:BIDid:28814
db:JVNDBid:JVNDB-2008-001321
db:PACKETSTORMid:38390
db:CNNVDid:CNNVD-200804-273
db:NVDid:CVE-2008-1025

LAST UPDATE DATE

2024-09-06T21:27:12.539000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#705529date:2008-04-18T00:00:00
db:CERT/CCid:VU#442845date:2007-03-09T00:00:00
db:VULHUBid:VHN-31150date:2017-08-08T00:00:00
db:BIDid:28814date:2008-07-11T19:49:00
db:JVNDBid:JVNDB-2008-001321date:2008-07-29T00:00:00
db:CNNVDid:CNNVD-200804-273date:2008-09-11T00:00:00
db:NVDid:CVE-2008-1025date:2017-08-08T01:29:50.120

SOURCES RELEASE DATE

db:CERT/CCid:VU#705529date:2008-04-18T00:00:00
db:CERT/CCid:VU#442845date:2005-07-06T00:00:00
db:VULHUBid:VHN-31150date:2008-04-17T00:00:00
db:BIDid:28814date:2008-04-16T00:00:00
db:JVNDBid:JVNDB-2008-001321date:2008-05-13T00:00:00
db:PACKETSTORMid:38390date:2005-07-01T23:31:00
db:CNNVDid:CNNVD-200804-273date:2008-04-17T00:00:00
db:NVDid:CVE-2008-1025date:2008-04-17T19:05:00