ID

VAR-200907-0426


CVE

CVE-2009-2575


TITLE

RIM BlackBerry 8800 Operational disruption ( Memory consumption and browser crash ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2009-002695

DESCRIPTION

The Research In Motion (RIM) BlackBerry 8800 allows remote attackers to cause a denial of service (memory consumption and browser crash) via a large integer value for the length property of a Select object, a related issue to CVE-2009-1692. Browsers from multiple vendors are prone to a denial-of-service vulnerability. Successfully exploiting this issue may allow attackers to crash an affected application. NOTE: This issue was previously covered in BID 35414 (Apple iPhone and iPod touch Prior to Version 3.0 Multiple Vulnerabilities), but has been assigned its own record to better document it

Trust: 1.89

sources: NVD: CVE-2009-2575 // JVNDB: JVNDB-2009-002695 // BID: 35446

AFFECTED PRODUCTS

vendor:rimmodel:blackberry 8800scope:eqversion:*

Trust: 1.0

vendor:blackberrymodel:8800scope: - version: -

Trust: 0.8

vendor:rimmodel:blackberry 8800scope: - version: -

Trust: 0.6

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:sonymodel:playstationscope:eqversion:30

Trust: 0.3

vendor:researchmodel:in motion blackberryscope:eqversion:88004.2

Trust: 0.3

vendor:researchmodel:in motion blackberryscope:eqversion:88004.1

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20080

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.63

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.62

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.61

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.601

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.60

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.52

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.51

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.50

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.5

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.27

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.26

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.25

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.24

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.23

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.22

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.21

Trust: 0.3

vendor:operamodel:software opera web browser betascope:eqversion:9.201

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.20

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.10

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.02

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9.01

Trust: 0.3

vendor:operamodel:software opera web browserscope:eqversion:9

Trust: 0.3

vendor:nokiamodel:n95 phonescope:eqversion:0

Trust: 0.3

vendor:nokiamodel:n82scope:eqversion:0

Trust: 0.3

vendor:nokiamodel:n810scope:eqversion:0

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:8.0.3.3

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:8.0.3.1

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:8.0.2

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:8.0.1

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:8.0

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.2

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.1

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:7.0

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.2.3

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.2.2

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.2.1

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.2

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.1

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.01

Trust: 0.3

vendor:netscapemodel:macscope:eqversion:6.0

Trust: 0.3

vendor:netscapemodel:netscapescope:eqversion:6.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0.1

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.9

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.8

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.7

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.6

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.4

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.3

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.17

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.16

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.10

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.1

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:3.05

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:3.0

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.2

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.15

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.14

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.13

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.12

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0.0.11

Trust: 0.3

vendor:mozillamodel:firefox rc3scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox rc2scope:eqversion:2.0

Trust: 0.3

vendor:mozillamodel:firefox betascope:eqversion:2.01

Trust: 0.3

vendor:mozillamodel:firefoxscope:eqversion:2.0

Trust: 0.3

vendor:midbrowsermodel:midbrowserscope:eqversion:0

Trust: 0.3

vendor:microsoftmodel:internet explorer sp4scope:eqversion:5.0.1

Trust: 0.3

vendor:microsoftmodel:internet explorer sp3scope:eqversion:5.0.1

Trust: 0.3

vendor:microsoftmodel:internet explorer sp2scope:eqversion:5.0.1

Trust: 0.3

vendor:microsoftmodel:internet explorer sp1scope:eqversion:5.0.1

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:5.0.1

Trust: 0.3

vendor:microsoftmodel:internet explorer rc1scope:eqversion:8

Trust: 0.3

vendor:microsoftmodel:internet explorer betascope:eqversion:82

Trust: 0.3

vendor:microsoftmodel:internet explorer betascope:eqversion:81

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:8

Trust: 0.3

vendor:microsoftmodel:internet explorer beta3scope:eqversion:7.0

Trust: 0.3

vendor:microsoftmodel:internet explorer beta2scope:eqversion:7.0

Trust: 0.3

vendor:microsoftmodel:internet explorer beta1scope:eqversion:7.0

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:7.0

Trust: 0.3

vendor:microsoftmodel:internet explorer sp1scope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:6.0

Trust: 0.3

vendor:microsoftmodel:internet explorer sp2scope:eqversion:5.5

Trust: 0.3

vendor:microsoftmodel:internet explorer sp1scope:eqversion:5.5

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:5.5

Trust: 0.3

vendor:microsoftmodel:internet explorerscope:eqversion:5.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.1

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.1

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:kdemodel:konqueror embeddedscope:eqversion:0.1

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.95

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.5.9

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.5.7

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.5.6

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.5.5

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.5.2

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.5.1

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.3.2

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.3.1

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.3

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.2.3

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.2.2-6

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.2.1

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.1.5

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.1.4

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.1.3

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.1.2

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.1.1

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.1

Trust: 0.3

vendor:kdemodel:konqueror bscope:eqversion:3.0.5

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.0.5

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.0.3

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.0.2

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.0.1

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:3.0

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:2.2.2

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:2.2.1

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:2.1.2

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:2.1.1

Trust: 0.3

vendor:kdemodel:konquerorscope:eqversion:4.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.1549

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.29

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.4

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:aigomodel:p8860scope:eqversion:0

Trust: 0.3

vendor:operamodel:software opera web browserscope:neversion:9.64

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:3.0.5

Trust: 0.3

vendor:mozillamodel:firefoxscope:neversion:2.0.19

Trust: 0.3

vendor:googlemodel:chromescope:neversion:2.0.172.37

Trust: 0.3

vendor:applemodel:ipod touchscope:neversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:neversion:3.0

Trust: 0.3

sources: BID: 35446 // JVNDB: JVNDB-2009-002695 // CNNVD: CNNVD-200907-336 // NVD: CVE-2009-2575

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2575
value: HIGH

Trust: 1.0

NVD: CVE-2009-2575
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200907-336
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2009-2575
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2009-002695 // CNNVD: CNNVD-200907-336 // NVD: CVE-2009-2575

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.8

sources: JVNDB: JVNDB-2009-002695 // NVD: CVE-2009-2575

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200907-336

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-200907-336

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002695

PATCH

title:BlackBerry 8800 Seriesurl:http://worldwide.blackberry.com/blackberry8800

Trust: 0.8

sources: JVNDB: JVNDB-2009-002695

EXTERNAL IDS

db:NVDid:CVE-2009-2575

Trust: 2.7

db:JVNDBid:JVNDB-2009-002695

Trust: 0.8

db:FULLDISCid:20090721 UPDATE: [GSEC-TZO-44-2009] ONE BUG TO RULE THEM ALL - FIREFOX, IE, SAFARI, OPERA, CHROME, SEAMONKEY, IPHONE, IPOD, WII, PS3....

Trust: 0.6

db:CNNVDid:CNNVD-200907-336

Trust: 0.6

db:BIDid:35446

Trust: 0.3

sources: BID: 35446 // JVNDB: JVNDB-2009-002695 // CNNVD: CNNVD-200907-336 // NVD: CVE-2009-2575

REFERENCES

url:http://lists.grok.org.uk/pipermail/full-disclosure/2009-july/069772.html

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2575

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2575

Trust: 0.8

url:http://support.apple.com/kb/ht3639

Trust: 0.3

url:http://www.apple.com/iphone/

Trust: 0.3

url:http://www.apple.com/ipodtouch/

Trust: 0.3

url:http://www.g-sec.lu/one-bug-to-rule-them-all.html

Trust: 0.3

url:http://www.mandriva.com/en/security/advisories?name=mdvsa-2009:346

Trust: 0.3

sources: BID: 35446 // JVNDB: JVNDB-2009-002695 // CNNVD: CNNVD-200907-336 // NVD: CVE-2009-2575

CREDITS

Oskar Lissheim-Boethius Oliver Quas Christian Schmitz

Trust: 0.6

sources: CNNVD: CNNVD-200907-336

SOURCES

db:BIDid:35446
db:JVNDBid:JVNDB-2009-002695
db:CNNVDid:CNNVD-200907-336
db:NVDid:CVE-2009-2575

LAST UPDATE DATE

2024-11-23T20:24:51.769000+00:00


SOURCES UPDATE DATE

db:BIDid:35446date:2015-03-19T08:42:00
db:JVNDBid:JVNDB-2009-002695date:2011-12-22T00:00:00
db:CNNVDid:CNNVD-200907-336date:2009-07-23T00:00:00
db:NVDid:CVE-2009-2575date:2024-11-21T01:05:12.323

SOURCES RELEASE DATE

db:BIDid:35446date:2009-06-17T00:00:00
db:JVNDBid:JVNDB-2009-002695date:2011-12-22T00:00:00
db:CNNVDid:CNNVD-200907-336date:2009-06-17T00:00:00
db:NVDid:CVE-2009-2575date:2009-07-22T18:30:00.467