ID

VAR-200807-0665


CVE

CVE-2008-1588


TITLE

Apple iPhone/iPod touch of Safari Vulnerable to spoofing the address bar

Trust: 0.8

sources: JVNDB: JVNDB-2008-001520

DESCRIPTION

Safari on Apple iPhone before 2.0 and iPod touch before 2.0 allows remote attackers to spoof the address bar via Unicode ideographic spaces in the URL. A vulnerability that may allow users to spoof websites. 2. An information-disclosure vulnerability. 3. A buffer-overflow vulnerability. 4. Two memory-corruption vulnerabilities. Successfully exploiting these issues may allow attackers to execute arbitrary code, crash the affected application, obtain sensitive information, or direct unsuspecting victims to a spoofed site; other attacks are also possible. These issues affect iPhone 1.0 through 1.1.4 and iPod touch 1.1 through 1.1.4. The Safari browser is embedded in both the iPhone and iPod Touch, and remote attackers can exploit multiple security holes in the browser to cause denial of service, read sensitive information, or execute arbitrary code. CVE-2008-2317 There is a memory corruption vulnerability in WebCore's processing of style sheet units. If a malicious site is visited, the browser may terminate unexpectedly or execute arbitrary code. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Apple Safari Multiple Vulnerabilities SECUNIA ADVISORY ID: SA35379 VERIFY ADVISORY: http://secunia.com/advisories/35379/ DESCRIPTION: Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to disclose sensitive information or compromise a user's system. PROVIDED AND/OR DISCOVERED BY: 1-3) Tavis Ormandy 4) Chris Evans of Google Inc. ---------------------------------------------------------------------- Want a new job? http://secunia.com/secunia_security_specialist/ http://secunia.com/hardcore_disassembler_and_reverse_engineer/ International Partner Manager - Project Sales in the IT-Security Industry: http://corporate.secunia.com/about_secunia/64/ ---------------------------------------------------------------------- TITLE: Apple iPhone / iPod touch Multiple Vulnerabilities SECUNIA ADVISORY ID: SA31074 VERIFY ADVISORY: http://secunia.com/advisories/31074/ CRITICAL: Highly critical IMPACT: Security Bypass, Cross Site Scripting, Spoofing, DoS, System access WHERE: >From remote OPERATING SYSTEM: Apple iPhone http://secunia.com/product/15128/ Apple iPod touch http://secunia.com/product/16074/ DESCRIPTION: Some vulnerabilities have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, cause a DoS (Denial of Service), bypass certain security restrictions, or compromise a user's system. 1) An error in CFNetwork can be exploited to spoof secure websites via 502 Bad Gateway errors from a malicious HTTPS proxy server. 2) A vulnerability in the handling of packets with an IPComp header can be exploited to cause a DoS. 4) An error exists in Safari within the handling of self-signed or invalid certificates. If a user clicks on the menu button while being prompted to accept or reject such a certificate, Safari automatically accepts the certificate on the next visit. 5) A signedness error in Safari when handling Javascript array indices can be exploited to trigger an out-of-bounds memory access and may allow execution of arbitrary code. 6) A vulnerability due to Safari ignoring Unicode Byte-order-Mark (BOM) sequences when parsing web pages can be exploited to bypass certain HTML and Javascript filtering mechanisms. This is related to vulnerability #8 in: SA20376 7) A vulnerability Safari can be exploited by malicious people to compromise a vulnerable system. For more information see vulnerability #3 in: SA30775 8) An unspecified error exists in WebKit in the processing of style-sheet elements. This can be exploited to cause a memory corruption and may allow execution of arbitrary code when a user visits a specially crafted web page. 9) An error in Safari when handling xml documents can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA28444 10) An error in Safari when processing xml documents can potentially be exploited by malicious people to compromise a user's system. For more information: SA30315 11) An unspecified error exists in JavaScriptCore's handling of runtime garbage collection. This can be exploited to cause a memory corruption and may allow execution of arbitrary code when a user visits a specially crafted web page. 12) Some vulnerabilities in Safari can be exploited by malicious people to conduct cross-site scripting attacks or potentially to compromise a user's system. SOLUTION: Upgrade to version 2.0 (downloadable and installable via iTunes). PROVIDED AND/OR DISCOVERED BY: The vendor credits: 4) Hiromitsu Takagi 5) SkyLined, Google 6) Chris Weber, Casaba Security, LLC 7) James Urquhart 8) Peter Vreudegnhil, working with the TippingPoint Zero Day Initiative 10) Anthony de Almeida Lopes of Outpost24 AB, and Chris Evans of Google Security Team 11) Itzik Kotler and Jonathan Rom of Radware 12) Robert Swiecki of the Google Security Team, David Bloom, and Charlie Miller of Independent Security Evaluators ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT2351 JVN: http://jvn.jp/jp/JVN88676089/index.html Chris Evans: http://scary.beasts.org/security/CESA-2008-004.html OTHER REFERENCES: SA20376: http://secunia.com/advisories/20376/ SA28444: http://secunia.com/advisories/28444/ SA29130: http://secunia.com/advisories/29130/ SA29846: http://secunia.com/advisories/29846/ SA30315: http://secunia.com/advisories/30315/ SA30775: http://secunia.com/advisories/30775/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2008-1588 // JVNDB: JVNDB-2008-001520 // BID: 30186 // VULHUB: VHN-31713 // PACKETSTORM: 78192 // PACKETSTORM: 68149

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:*

Trust: 1.0

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.9

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.9

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.9

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.9

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.9

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.9

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.7

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.7

Trust: 0.8

vendor:applemodel:iphonescope:eqversion:v1.0 to v1.1.4

Trust: 0.8

vendor:applemodel:ipod touchscope:eqversion:v1.1 to v1.1.4

Trust: 0.8

vendor:applemodel:safariscope:ltversion:4.0

Trust: 0.8

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:4

Trust: 0.3

vendor:applemodel:safariscope:neversion:4

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:neversion:2.0

Trust: 0.3

sources: BID: 30186 // JVNDB: JVNDB-2008-001520 // CNNVD: CNNVD-200807-211 // NVD: CVE-2008-1588

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-1588
value: MEDIUM

Trust: 1.0

NVD: CVE-2008-1588
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200807-211
value: MEDIUM

Trust: 0.6

VULHUB: VHN-31713
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2008-1588
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-31713
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-31713 // JVNDB: JVNDB-2008-001520 // CNNVD: CNNVD-200807-211 // NVD: CVE-2008-1588

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-31713 // JVNDB: JVNDB-2008-001520 // NVD: CVE-2008-1588

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200807-211

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-200807-211

CONFIGURATIONS

sources: JVNDB: JVNDB-2008-001520

PATCH

title:HT3613url:http://support.apple.com/kb/HT3613

Trust: 0.8

title:HT2351url:http://support.apple.com/kb/HT2351

Trust: 0.8

title:HT2351url:http://support.apple.com/kb/HT2351?viewlocale=ja_JP&locale=ja_JP

Trust: 0.8

title:HT3613url:http://support.apple.com/kb/HT3613?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2008-001520

EXTERNAL IDS

db:NVDid:CVE-2008-1588

Trust: 2.8

db:BIDid:30186

Trust: 2.8

db:SECUNIAid:31074

Trust: 1.9

db:SECUNIAid:35379

Trust: 1.8

db:VUPENid:ADV-2009-1522

Trust: 1.7

db:VUPENid:ADV-2008-2094

Trust: 1.7

db:JVNDBid:JVNDB-2008-001520

Trust: 0.8

db:CNNVDid:CNNVD-200807-211

Trust: 0.7

db:VULHUBid:VHN-31713

Trust: 0.1

db:PACKETSTORMid:78192

Trust: 0.1

db:JVNid:JVN88676089

Trust: 0.1

db:PACKETSTORMid:68149

Trust: 0.1

sources: VULHUB: VHN-31713 // BID: 30186 // JVNDB: JVNDB-2008-001520 // PACKETSTORM: 78192 // PACKETSTORM: 68149 // CNNVD: CNNVD-200807-211 // NVD: CVE-2008-1588

REFERENCES

url:http://www.securityfocus.com/bid/30186

Trust: 2.5

url:http://support.apple.com/kb/ht3613

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2008//jul/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html

Trust: 1.7

url:http://secunia.com/advisories/31074

Trust: 1.7

url:http://secunia.com/advisories/35379

Trust: 1.7

url:http://www.vupen.com/english/advisories/2008/2094/references

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/1522

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/43732

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1588

Trust: 0.8

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2008-1588

Trust: 0.8

url:http://support.apple.com/kb/ht2351

Trust: 0.4

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:/archive/1/494777

Trust: 0.3

url:http://support.apple.com/kb/ht3298

Trust: 0.3

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/35379/

Trust: 0.1

url:http://secunia.com/advisories/33970/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/34723/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://scary.beasts.org/security/cesa-2009-006.html

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/29130/

Trust: 0.1

url:http://secunia.com/product/15128/

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/20376/

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/30775/

Trust: 0.1

url:http://secunia.com/hardcore_disassembler_and_reverse_engineer/

Trust: 0.1

url:http://scary.beasts.org/security/cesa-2008-004.html

Trust: 0.1

url:http://jvn.jp/jp/jvn88676089/index.html

Trust: 0.1

url:http://secunia.com/advisories/28444/

Trust: 0.1

url:http://secunia.com/advisories/29846/

Trust: 0.1

url:http://secunia.com/advisories/31074/

Trust: 0.1

url:http://secunia.com/secunia_security_specialist/

Trust: 0.1

url:http://corporate.secunia.com/about_secunia/64/

Trust: 0.1

url:http://secunia.com/product/16074/

Trust: 0.1

url:http://secunia.com/advisories/30315/

Trust: 0.1

sources: VULHUB: VHN-31713 // BID: 30186 // JVNDB: JVNDB-2008-001520 // PACKETSTORM: 78192 // PACKETSTORM: 68149 // CNNVD: CNNVD-200807-211 // NVD: CVE-2008-1588

CREDITS

Jonathan Rom Hiromitsu Takagi SkyLined

Trust: 0.6

sources: CNNVD: CNNVD-200807-211

SOURCES

db:VULHUBid:VHN-31713
db:BIDid:30186
db:JVNDBid:JVNDB-2008-001520
db:PACKETSTORMid:78192
db:PACKETSTORMid:68149
db:CNNVDid:CNNVD-200807-211
db:NVDid:CVE-2008-1588

LAST UPDATE DATE

2024-11-23T20:19:11.637000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-31713date:2017-08-08T00:00:00
db:BIDid:30186date:2009-06-09T16:49:00
db:JVNDBid:JVNDB-2008-001520date:2009-07-08T00:00:00
db:CNNVDid:CNNVD-200807-211date:2022-08-10T00:00:00
db:NVDid:CVE-2008-1588date:2024-11-21T00:44:52.330

SOURCES RELEASE DATE

db:VULHUBid:VHN-31713date:2008-07-14T00:00:00
db:BIDid:30186date:2008-07-11T00:00:00
db:JVNDBid:JVNDB-2008-001520date:2008-08-01T00:00:00
db:PACKETSTORMid:78192date:2009-06-10T12:30:42
db:PACKETSTORMid:68149date:2008-07-15T00:11:26
db:CNNVDid:CNNVD-200807-211date:2008-07-14T00:00:00
db:NVDid:CVE-2008-1588date:2008-07-14T18:41:00