ID

VAR-200807-0012


CVE

CVE-2008-2317


TITLE

Multiple PHP XML-RPC implementations vulnerable to code injection

Trust: 0.8

sources: CERT/CC: VU#442845

DESCRIPTION

WebCore in Apple Safari does not properly perform garbage collection of JavaScript document elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption and application crash) via a reference to the ownerNode property of a copied CSSStyleSheet object of a STYLE element, as originally demonstrated on Apple iPhone before 2.0 and iPod touch before 2.0, a different vulnerability than CVE-2008-1590. A vulnerability in a common PHP extension module could allow a remote attacker to execute code on a vulnerable system. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.The specific flaw exists in the garbage collection of JavaScript document elements in WebCore. Apple iPhone and iPod touch are prone to multiple remote vulnerabilities: 1. A vulnerability that may allow users to spoof websites. 2. An information-disclosure vulnerability. 3. A buffer-overflow vulnerability. 4. Two memory-corruption vulnerabilities. Successfully exploiting these issues may allow attackers to execute arbitrary code, crash the affected application, obtain sensitive information, or direct unsuspecting victims to a spoofed site; other attacks are also possible. These issues affect iPhone 1.0 through 1.1.4 and iPod touch 1.1 through 1.1.4. ---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: phpPgAds XML-RPC PHP Code Execution Vulnerability SECUNIA ADVISORY ID: SA15884 VERIFY ADVISORY: http://secunia.com/advisories/15884/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: phpPgAds 2.x http://secunia.com/product/4577/ DESCRIPTION: A vulnerability has been reported in phpPgAds, which can be exploited by malicious people to compromise a vulnerable system. For more information: SA15852 SOLUTION: Update to version 2.0.5. http://sourceforge.net/project/showfiles.php?group_id=36679 OTHER REFERENCES: SA15852: http://secunia.com/advisories/15852/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ZDI-08-045: Apple Safari StyleSheet ownerNode Heap Corruption Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-08-045 July 25, 2008 -- CVE ID: CVE-2008-2317 -- Affected Vendors: Apple -- Affected Products: Apple Safari -- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 6146. -- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at: http://support.apple.com/kb/HT2351 -- Disclosure Timeline: 2008-05-13 - Vulnerability reported to vendor 2008-07-25 - Coordinated public release of advisory -- Credit: This vulnerability was discovered by: * Anonymous -- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities. Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at: http://www.zerodayinitiative.com The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product. Our vulnerability disclosure policy is available online at: http://www.zerodayinitiative.com/advisories/disclosure_policy/ CONFIDENTIALITY NOTICE: This e-mail message, including any attachments, is being sent by 3Com for the sole use of the intended recipient(s) and may contain confidential, proprietary and/or privileged information. Any unauthorized review, use, disclosure and/or distribution by any recipient is prohibited. If you are not the intended recipient, please delete and/or destroy all copies of this message regardless of form and any included attachments and notify 3Com immediately by contacting the sender via reply e-mail or forwarding to 3Com at postmaster@3com.com

Trust: 3.51

sources: NVD: CVE-2008-2317 // CERT/CC: VU#442845 // JVNDB: JVNDB-2008-001522 // ZDI: ZDI-08-045 // BID: 30186 // VULHUB: VHN-32442 // PACKETSTORM: 38390 // PACKETSTORM: 68524

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:*

Trust: 1.0

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.9

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.9

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.9

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.9

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.9

vendor:drupalmodel: - scope: - version: -

Trust: 0.8

vendor:gentoo linuxmodel: - scope: - version: -

Trust: 0.8

vendor:mandrivamodel: - scope: - version: -

Trust: 0.8

vendor:pear xml rpcmodel: - scope: - version: -

Trust: 0.8

vendor:phpxmlrpcmodel: - scope: - version: -

Trust: 0.8

vendor:postnukemodel: - scope: - version: -

Trust: 0.8

vendor:red hatmodel: - scope: - version: -

Trust: 0.8

vendor:serendipitymodel: - scope: - version: -

Trust: 0.8

vendor:trustix secure linuxmodel: - scope: - version: -

Trust: 0.8

vendor:ubuntu linuxmodel: - scope: - version: -

Trust: 0.8

vendor:wordpressmodel: - scope: - version: -

Trust: 0.8

vendor:xoopsmodel: - scope: - version: -

Trust: 0.8

vendor:phpmyfaqmodel: - scope: - version: -

Trust: 0.8

vendor:applemodel:iphonescope:eqversion:v1.0 to v1.1.4

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:v1.1 to v1.1.4

Trust: 0.8

vendor:applemodel:safariscope:ltversion:3.2

Trust: 0.8

vendor:applemodel:safariscope: - version: -

Trust: 0.7

vendor:applemodel:iphonescope:eqversion:1.0

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:4

Trust: 0.3

vendor:applemodel:safariscope:neversion:4

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:neversion:2.0

Trust: 0.3

sources: CERT/CC: VU#442845 // ZDI: ZDI-08-045 // BID: 30186 // JVNDB: JVNDB-2008-001522 // CNNVD: CNNVD-200807-217 // NVD: CVE-2008-2317

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-2317
value: HIGH

Trust: 1.0

CARNEGIE MELLON: VU#442845
value: 20.75

Trust: 0.8

NVD: CVE-2008-2317
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200807-217
value: MEDIUM

Trust: 0.6

VULHUB: VHN-32442
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2008-2317
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-32442
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CERT/CC: VU#442845 // VULHUB: VHN-32442 // JVNDB: JVNDB-2008-001522 // CNNVD: CNNVD-200807-217 // NVD: CVE-2008-2317

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-32442 // JVNDB: JVNDB-2008-001522 // NVD: CVE-2008-2317

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 68524 // CNNVD: CNNVD-200807-217

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200807-217

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001522

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-32442

PATCH

title:HT2351url:http://support.apple.com/kb/HT2351

Trust: 1.5

title:HT3298url:http://support.apple.com/kb/HT3298

Trust: 0.8

title:HT2351url:http://support.apple.com/kb/HT2351?viewlocale=ja_JP&locale=ja_JP

Trust: 0.8

title:Apple Safari Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=156708

Trust: 0.6

sources: ZDI: ZDI-08-045 // JVNDB: JVNDB-2008-001522 // CNNVD: CNNVD-200807-217

EXTERNAL IDS

db:NVDid:CVE-2008-2317

Trust: 3.6

db:BIDid:30186

Trust: 2.8

db:ZDIid:ZDI-08-045

Trust: 2.5

db:SECUNIAid:31074

Trust: 1.7

db:SECUNIAid:32706

Trust: 1.7

db:VUPENid:ADV-2008-2094

Trust: 1.7

db:SECUNIAid:15884

Trust: 0.9

db:SECUNIAid:15810

Trust: 0.8

db:SECUNIAid:15922

Trust: 0.8

db:SECUNIAid:15852

Trust: 0.8

db:SECUNIAid:15855

Trust: 0.8

db:SECUNIAid:15861

Trust: 0.8

db:SECUNIAid:15862

Trust: 0.8

db:SECUNIAid:15872

Trust: 0.8

db:SECUNIAid:15883

Trust: 0.8

db:SECUNIAid:15895

Trust: 0.8

db:BIDid:14088

Trust: 0.8

db:SECTRACKid:1014327

Trust: 0.8

db:CERT/CCid:VU#442845

Trust: 0.8

db:JVNDBid:JVNDB-2008-001522

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-332

Trust: 0.7

db:CNNVDid:CNNVD-200807-217

Trust: 0.6

db:PACKETSTORMid:68524

Trust: 0.2

db:VULHUBid:VHN-32442

Trust: 0.1

db:PACKETSTORMid:38390

Trust: 0.1

sources: CERT/CC: VU#442845 // ZDI: ZDI-08-045 // VULHUB: VHN-32442 // BID: 30186 // JVNDB: JVNDB-2008-001522 // PACKETSTORM: 38390 // PACKETSTORM: 68524 // CNNVD: CNNVD-200807-217 // NVD: CVE-2008-2317

REFERENCES

url:http://www.securityfocus.com/bid/30186

Trust: 2.5

url:http://support.apple.com/kb/ht3298

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2008//jul/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce//2008/nov/msg00001.html

Trust: 1.7

url:http://www.securityfocus.com/archive/1/494777/100/0/threaded

Trust: 1.7

url:http://www.zerodayinitiative.com/advisories/zdi-08-045/

Trust: 1.7

url:http://secunia.com/advisories/31074

Trust: 1.7

url:http://secunia.com/advisories/32706

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2094/references

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43737

Trust: 1.7

url:http://support.apple.com/kb/ht2351

Trust: 1.1

url:http://secunia.com/advisories/15884/

Trust: 0.9

url:http://secunia.com/advisories/15852/

Trust: 0.9

url:http://www.hardened-php.net/advisory-022005.php

Trust: 0.8

url:http://secunia.com/advisories/15861/

Trust: 0.8

url:http://secunia.com/advisories/15862/

Trust: 0.8

url:http://secunia.com/advisories/15895/

Trust: 0.8

url:http://secunia.com/advisories/15883/

Trust: 0.8

url:http://news.postnuke.com/modules.php?op=modload&name=news&file=article&sid=2699

Trust: 0.8

url:http://secunia.com/advisories/15855/

Trust: 0.8

url:http://secunia.com/advisories/15810/

Trust: 0.8

url:http://secunia.com/advisories/15872/

Trust: 0.8

url:http://secunia.com/advisories/15922/

Trust: 0.8

url:http://securitytracker.com/alerts/2005/jun/1014327.html

Trust: 0.8

url:http://www.gulftech.org/?node=research&article_id=00088-07022005

Trust: 0.8

url:http://www.gulftech.org/?node=research&article_id=00087-07012005

Trust: 0.8

url:http://www.securityfocus.com/bid/14088

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2317

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-2317

Trust: 0.8

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:/archive/1/494777

Trust: 0.3

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/4577/

Trust: 0.1

url:http://secunia.com/secunia_vacancies/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://sourceforge.net/project/showfiles.php?group_id=36679

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/disclosure_policy/

Trust: 0.1

url:http://www.zerodayinitiative.com/advisories/zdi-08-045

Trust: 0.1

url:http://www.tippingpoint.com

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-2317

Trust: 0.1

url:http://www.zerodayinitiative.com

Trust: 0.1

sources: CERT/CC: VU#442845 // ZDI: ZDI-08-045 // VULHUB: VHN-32442 // BID: 30186 // JVNDB: JVNDB-2008-001522 // PACKETSTORM: 38390 // PACKETSTORM: 68524 // CNNVD: CNNVD-200807-217 // NVD: CVE-2008-2317

CREDITS

Anonymous

Trust: 0.7

sources: ZDI: ZDI-08-045

SOURCES

db:CERT/CCid:VU#442845
db:ZDIid:ZDI-08-045
db:VULHUBid:VHN-32442
db:BIDid:30186
db:JVNDBid:JVNDB-2008-001522
db:PACKETSTORMid:38390
db:PACKETSTORMid:68524
db:CNNVDid:CNNVD-200807-217
db:NVDid:CVE-2008-2317

LAST UPDATE DATE

2024-09-06T21:26:58.303000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#442845date:2007-03-09T00:00:00
db:ZDIid:ZDI-08-045date:2008-07-25T00:00:00
db:VULHUBid:VHN-32442date:2018-10-11T00:00:00
db:BIDid:30186date:2009-06-09T16:49:00
db:JVNDBid:JVNDB-2008-001522date:2008-12-05T00:00:00
db:CNNVDid:CNNVD-200807-217date:2022-08-10T00:00:00
db:NVDid:CVE-2008-2317date:2022-08-09T13:46:59.350

SOURCES RELEASE DATE

db:CERT/CCid:VU#442845date:2005-07-06T00:00:00
db:ZDIid:ZDI-08-045date:2008-07-25T00:00:00
db:VULHUBid:VHN-32442date:2008-07-14T00:00:00
db:BIDid:30186date:2008-07-11T00:00:00
db:JVNDBid:JVNDB-2008-001522date:2008-08-01T00:00:00
db:PACKETSTORMid:38390date:2005-07-01T23:31:00
db:PACKETSTORMid:68524date:2008-07-26T00:58:18
db:CNNVDid:CNNVD-200807-217date:2008-07-14T00:00:00
db:NVDid:CVE-2008-2317date:2008-07-14T18:41:00