ID

VAR-200911-0397


CVE

CVE-2009-2816


TITLE

WebKit Vulnerable to cross-site request forgery

Trust: 0.8

sources: JVNDB: JVNDB-2009-002394

DESCRIPTION

The implementation of Cross-Origin Resource Sharing (CORS) in WebKit, as used in Apple Safari before 4.0.4 and Google Chrome before 3.0.195.33, includes certain custom HTTP headers in the OPTIONS request during cross-origin operations with preflight, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web page. Apple Safari Used in etc. WebKit is prone to a vulnerability that lets attackers bypass the same-origin policy. Attackers can exploit this issue to access resources from another origin in the context of another domain. This can facilitate cross-site request-forgery attacks. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Apple Safari Multiple Vulnerabilities SECUNIA ADVISORY ID: SA37346 VERIFY ADVISORY: http://secunia.com/advisories/37346/ DESCRIPTION: Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or compromise a user's system. 1) An integer overflow error when processing ColorSync profiles embedded in images can be exploited to potentially execute arbitrary code. For more information see vulnerability #4 in: SA36701 2) An error exists when handling an "Open Image in New Tab", "Open Image in New Window", or "Open Link in New Tab" shortcut menu action performed on a link to a local file. This can be exploited to load a local HTML file and disclose sensitive information by tricking a user into performing the affected actions within a specially crafted webpage. 3) An error exists in WebKit when sending "preflight" requests originating from a page in a different origin. 4) Multiple errors in WebKit when handling FTP directory listings on Windows can be exploited to disclose sensitive information, cause a crash, or potentially execute arbitrary code. 5) An error in WebKit when handling an HTML 5 Media Element on Mac OS X can be exploited to bypass remote image loading restrictions via e.g. HTML-formatted emails. NOTE: Some errors leading to crashes, caused by the included libxml2 library, have also been reported. SOLUTION: Update to version 4.0.4. PROVIDED AND/OR DISCOVERED BY: 1-3, 5) Reported by the vendor. 4) The vendor credits Michal Zalewski of Google Inc. ORIGINAL ADVISORY: http://support.apple.com/kb/HT3949 OTHER REFERENCES: SA36701: http://secunia.com/advisories/36701/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . This is related to vulnerability #3 in: SA37346 The security issue is reported in versions prior to 3.0.195.33. For more information: SA37346 SOLUTION: Do not browse untrusted sites with an application using Qt components based on WebKit. ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). Request a free trial: http://secunia.com/products/corporate/vim/ ---------------------------------------------------------------------- TITLE: SUSE update for Multiple Packages SECUNIA ADVISORY ID: SA43068 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43068/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43068 RELEASE DATE: 2011-01-25 DISCUSS ADVISORY: http://secunia.com/advisories/43068/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/43068/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=43068 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: SUSE has issued an update for multiple packages, which fixes multiple vulnerabilities

Trust: 2.43

sources: NVD: CVE-2009-2816 // JVNDB: JVNDB-2009-002394 // BID: 36997 // VULHUB: VHN-40262 // PACKETSTORM: 82605 // PACKETSTORM: 82625 // PACKETSTORM: 82635 // PACKETSTORM: 97846 // PACKETSTORM: 82630

AFFECTED PRODUCTS

vendor:applemodel:safariscope:ltversion:4.0.4

Trust: 1.8

vendor:opensusemodel:opensusescope:eqversion:11.3

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:11

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:12

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:4.0

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:3.0.195.33

Trust: 1.0

vendor:opensusemodel:opensusescope:eqversion:11.2

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6.1

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6.2

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.4.11

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.1

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6.2

Trust: 0.8

vendor:applemodel:iosscope:eqversion:2.0 to 3.1.3

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:2.1 to 3.1.3

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:safariscope:eqversion:1.0.0b2

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.1.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.0.0

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.0.1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.0.0b1

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.1.0

Trust: 0.6

vendor:applemodel:safariscope:eqversion:1.0.2

Trust: 0.6

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:pardusmodel:linuxscope:eqversion:20090

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.4

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.3

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.2

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safari beta for windowsscope:eqversion:3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:googlemodel:chromescope:neversion:3.0.195.33

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:4.0.4

Trust: 0.3

vendor:applemodel:safariscope:neversion:4.0.4

Trust: 0.3

vendor:applemodel:iosscope:neversion:4

Trust: 0.3

sources: BID: 36997 // JVNDB: JVNDB-2009-002394 // CNNVD: CNNVD-200911-148 // NVD: CVE-2009-2816

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2816
value: MEDIUM

Trust: 1.0

NVD: CVE-2009-2816
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200911-148
value: MEDIUM

Trust: 0.6

VULHUB: VHN-40262
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2009-2816
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-40262
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-40262 // JVNDB: JVNDB-2009-002394 // CNNVD: CNNVD-200911-148 // NVD: CVE-2009-2816

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-40262 // JVNDB: JVNDB-2009-002394 // NVD: CVE-2009-2816

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200911-148

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-200911-148

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-002394

PATCH

title:HT4225url:http://support.apple.com/kb/HT4225

Trust: 0.8

title:HT3949url:http://support.apple.com/kb/HT3949

Trust: 0.8

title:HT3949url:http://support.apple.com/kb/HT3949?viewlocale=ja_JP

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2009-002394

EXTERNAL IDS

db:NVDid:CVE-2009-2816

Trust: 2.8

db:BIDid:36997

Trust: 2.8

db:SECUNIAid:37346

Trust: 2.6

db:SECTRACKid:1023165

Trust: 2.5

db:VUPENid:ADV-2009-3217

Trust: 2.5

db:OSVDBid:59940

Trust: 2.5

db:SECUNIAid:37358

Trust: 1.8

db:SECUNIAid:37393

Trust: 1.8

db:SECUNIAid:43068

Trust: 1.8

db:SECUNIAid:37397

Trust: 1.8

db:VUPENid:ADV-2011-0212

Trust: 1.7

db:VUPENid:ADV-2009-3233

Trust: 1.7

db:OSVDBid:59967

Trust: 1.7

db:XFid:54239

Trust: 0.8

db:JVNDBid:JVNDB-2009-002394

Trust: 0.8

db:CNNVDid:CNNVD-200911-148

Trust: 0.7

db:VULHUBid:VHN-40262

Trust: 0.1

db:PACKETSTORMid:82605

Trust: 0.1

db:PACKETSTORMid:82625

Trust: 0.1

db:PACKETSTORMid:82635

Trust: 0.1

db:PACKETSTORMid:97846

Trust: 0.1

db:PACKETSTORMid:82630

Trust: 0.1

sources: VULHUB: VHN-40262 // BID: 36997 // JVNDB: JVNDB-2009-002394 // PACKETSTORM: 82605 // PACKETSTORM: 82625 // PACKETSTORM: 82635 // PACKETSTORM: 97846 // PACKETSTORM: 82630 // CNNVD: CNNVD-200911-148 // NVD: CVE-2009-2816

REFERENCES

url:http://www.securityfocus.com/bid/36997

Trust: 2.5

url:http://osvdb.org/59940

Trust: 2.5

url:http://www.securitytracker.com/id?1023165

Trust: 2.5

url:http://secunia.com/advisories/37346

Trust: 2.5

url:http://www.vupen.com/english/advisories/2009/3217

Trust: 2.5

url:http://support.apple.com/kb/ht3949

Trust: 1.8

url:https://www.redhat.com/archives/fedora-package-announce/2009-november/msg00549.html

Trust: 1.8

url:http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

Trust: 1.8

url:http://lists.apple.com/archives/security-announce/2009/nov/msg00001.html

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2010/jun/msg00003.html

Trust: 1.7

url:http://support.apple.com/kb/ht4225

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=525789

Trust: 1.7

url:https://www.redhat.com/archives/fedora-package-announce/2009-november/msg00545.html

Trust: 1.7

url:http://osvdb.org/59967

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6516

Trust: 1.7

url:http://secunia.com/advisories/37358

Trust: 1.7

url:http://secunia.com/advisories/37393

Trust: 1.7

url:http://secunia.com/advisories/37397

Trust: 1.7

url:http://secunia.com/advisories/43068

Trust: 1.7

url:http://www.vupen.com/english/advisories/2009/3233

Trust: 1.7

url:http://www.vupen.com/english/advisories/2011/0212

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/54239

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2816

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/54239

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2816

Trust: 0.8

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.5

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.5

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.5

url:http://googlechromereleases.blogspot.com/2009/11/stable-update-fix-google-chrome-not.html

Trust: 0.4

url:http://secunia.com/advisories/business_solutions/

Trust: 0.4

url:http://www.apple.com/safari/

Trust: 0.3

url:http://secunia.com/advisories/37346/

Trust: 0.3

url:http://secunia.com/advisories/37393/

Trust: 0.2

url:http://secunia.com/advisories/36701/

Trust: 0.1

url:http://secunia.com/advisories/37358/

Trust: 0.1

url:http://trac.webkit.org/changeset/47494

Trust: 0.1

url:http://trac.webkit.org/changeset/48725

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=43068

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/advisories/43068/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/43068/

Trust: 0.1

url:https://www.redhat.com/archives/fedora-package-announce/2009-november/msg00546.html

Trust: 0.1

url:http://secunia.com/advisories/37397/

Trust: 0.1

sources: VULHUB: VHN-40262 // BID: 36997 // JVNDB: JVNDB-2009-002394 // PACKETSTORM: 82605 // PACKETSTORM: 82625 // PACKETSTORM: 82635 // PACKETSTORM: 97846 // PACKETSTORM: 82630 // CNNVD: CNNVD-200911-148 // NVD: CVE-2009-2816

CREDITS

Apple

Trust: 0.9

sources: BID: 36997 // CNNVD: CNNVD-200911-148

SOURCES

db:VULHUBid:VHN-40262
db:BIDid:36997
db:JVNDBid:JVNDB-2009-002394
db:PACKETSTORMid:82605
db:PACKETSTORMid:82625
db:PACKETSTORMid:82635
db:PACKETSTORMid:97846
db:PACKETSTORMid:82630
db:CNNVDid:CNNVD-200911-148
db:NVDid:CVE-2009-2816

LAST UPDATE DATE

2024-11-23T20:16:47.539000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-40262date:2017-09-19T00:00:00
db:BIDid:36997date:2015-04-13T22:10:00
db:JVNDBid:JVNDB-2009-002394date:2010-07-13T00:00:00
db:CNNVDid:CNNVD-200911-148date:2021-11-09T00:00:00
db:NVDid:CVE-2009-2816date:2024-11-21T01:05:48.340

SOURCES RELEASE DATE

db:VULHUBid:VHN-40262date:2009-11-13T00:00:00
db:BIDid:36997date:2009-11-11T00:00:00
db:JVNDBid:JVNDB-2009-002394date:2010-01-07T00:00:00
db:PACKETSTORMid:82605date:2009-11-16T09:29:40
db:PACKETSTORMid:82625date:2009-11-16T09:30:32
db:PACKETSTORMid:82635date:2009-11-16T10:41:50
db:PACKETSTORMid:97846date:2011-01-25T03:59:20
db:PACKETSTORMid:82630date:2009-11-16T09:30:46
db:CNNVDid:CNNVD-200911-148date:2009-11-13T00:00:00
db:NVDid:CVE-2009-2816date:2009-11-13T15:30:00.563