ID

VAR-201003-1061


CVE

CVE-2010-0043


TITLE

Apple Safari of ImageIO Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2010-001183

DESCRIPTION

ImageIO in Apple Safari before 4.0.5 and iTunes before 9.1 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image. Safari is prone to a remote code-execution vulnerability because it fails to properly handle crafted TIFF images. Attackers may exploit this issue to execute arbitrary code in the context of the application. Failed attacks will result in a denial-of-service condition. Versions prior to Safari 4.0.5 running on Microsoft Windows 7, XP, and Vista are vulnerable. This issue was previously documented in BID 38671 (Apple Safari Prior to 4.0.5 Multiple Security Vulnerabilities) but has been given its own record to better document it. ---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Apple iTunes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA39135 VERIFY ADVISORY: http://secunia.com/advisories/39135/ DESCRIPTION: Some vulnerabilities have been reported in Apple iTunes, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or compromise a user's system. For more information see vulnerabilities #1 through #4 and #9 in: SA38932 2) An error when processing MP4 files can be exploited to trigger the execution of an infinite loop and render the application unusable after its restart via e.g. a specially crafted podcast. 3) During installation iTunes for Windows installs and executes certain files in a directory in the ""%ALLUSERSPROFILE%\Application Data\" path. As standard permissions allows any user to write files to the path, this can be exploited to either create malicious files with specific names before installation or malicious libraries after installation, allowing execution of arbitrary code with SYSTEM privileges. The vulnerabilities are reported in versions prior to 9.1. SOLUTION: Update to version 9.1. PROVIDED AND/OR DISCOVERED BY: 2) The vendor credits Sojeong Hong, Sourcefire VRT 3) Jason Geffner, NGSSoftware CHANGELOG: 2010-03-31: Added additional information provided by NGSSoftware. ORIGINAL ADVISORY: http://support.apple.com/kb/HT4105 OTHER REFERENCES: SA38932: http://secunia.com/advisories/38932/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.34

sources: NVD: CVE-2010-0043 // JVNDB: JVNDB-2010-001183 // BID: 38673 // BID: 38671 // VULHUB: VHN-42648 // PACKETSTORM: 87984

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.6

vendor:applemodel:safariscope:lteversion:4.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.9

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:iosscope:eqversion:2.0 to 3.1.3

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:2.1 to 3.1.3

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:9.1

Trust: 0.8

vendor:applemodel:safariscope:ltversion:4.0.5

Trust: 0.8

vendor:applemodel:safari for windowsscope:eqversion:4.0.4

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.6

vendor:applemodel:safari for windowsscope:neversion:4.0.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.3

Trust: 0.3

vendor:applemodel:itunesscope:neversion:9.1

Trust: 0.3

vendor:applemodel:iosscope:neversion:4

Trust: 0.3

vendor:applemodel:safariscope:neversion:4.0.5

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

sources: BID: 38673 // BID: 38671 // JVNDB: JVNDB-2010-001183 // CNNVD: CNNVD-201003-182 // NVD: CVE-2010-0043

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0043
value: HIGH

Trust: 1.0

NVD: CVE-2010-0043
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201003-182
value: CRITICAL

Trust: 0.6

VULHUB: VHN-42648
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2010-0043
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-42648
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-42648 // JVNDB: JVNDB-2010-001183 // CNNVD: CNNVD-201003-182 // NVD: CVE-2010-0043

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.9

sources: VULHUB: VHN-42648 // JVNDB: JVNDB-2010-001183 // NVD: CVE-2010-0043

THREAT TYPE

network

Trust: 0.6

sources: BID: 38673 // BID: 38671

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201003-182

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001183

PATCH

title:HT4070url:http://support.apple.com/kb/HT4070

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077

Trust: 0.8

title:HT4105url:http://support.apple.com/kb/HT4105

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225

Trust: 0.8

title:HT4070url:http://support.apple.com/kb/HT4070?viewlocale=ja_JP

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077?viewlocale=ja_JP

Trust: 0.8

title:HT4105url:http://support.apple.com/kb/HT4105?viewlocale=ja_JP

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2010-001183

EXTERNAL IDS

db:NVDid:CVE-2010-0043

Trust: 2.8

db:BIDid:38673

Trust: 2.8

db:BIDid:38671

Trust: 2.0

db:SECUNIAid:39135

Trust: 1.2

db:SECTRACKid:1023706

Trust: 1.1

db:JVNDBid:JVNDB-2010-001183

Trust: 0.8

db:CNNVDid:CNNVD-201003-182

Trust: 0.7

db:APPLEid:APPLE-SA-2010-03-11-1

Trust: 0.6

db:NSFOCUSid:14628

Trust: 0.6

db:VULHUBid:VHN-42648

Trust: 0.1

db:PACKETSTORMid:87984

Trust: 0.1

sources: VULHUB: VHN-42648 // BID: 38673 // BID: 38671 // JVNDB: JVNDB-2010-001183 // PACKETSTORM: 87984 // CNNVD: CNNVD-201003-182 // NVD: CVE-2010-0043

REFERENCES

url:http://www.securityfocus.com/bid/38673

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2010/mar/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/38671

Trust: 1.7

url:http://support.apple.com/kb/ht4070

Trust: 1.7

url:http://support.apple.com/kb/ht4105

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00001.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010/jun/msg00003.html

Trust: 1.1

url:http://support.apple.com/kb/ht4077

Trust: 1.1

url:http://support.apple.com/kb/ht4225

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6901

Trust: 1.1

url:http://www.securitytracker.com/id?1023706

Trust: 1.1

url:http://secunia.com/advisories/39135

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0043

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0043

Trust: 0.8

url:http://www.apple.com/safari/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/14628

Trust: 0.6

url:http://secunia.com/advisories/38932/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/39135/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-42648 // BID: 38673 // BID: 38671 // JVNDB: JVNDB-2010-001183 // PACKETSTORM: 87984 // CNNVD: CNNVD-201003-182 // NVD: CVE-2010-0043

CREDITS

Matthew Jurczyk Billy Rios Robert Swiecki robert@swiecki.net wushi wooshi@gmail.com

Trust: 0.6

sources: CNNVD: CNNVD-201003-182

SOURCES

db:VULHUBid:VHN-42648
db:BIDid:38673
db:BIDid:38671
db:JVNDBid:JVNDB-2010-001183
db:PACKETSTORMid:87984
db:CNNVDid:CNNVD-201003-182
db:NVDid:CVE-2010-0043

LAST UPDATE DATE

2024-11-23T21:02:28.031000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-42648date:2017-09-19T00:00:00
db:BIDid:38673date:2010-06-21T22:28:00
db:BIDid:38671date:2010-03-12T15:32:00
db:JVNDBid:JVNDB-2010-001183date:2010-07-13T00:00:00
db:CNNVDid:CNNVD-201003-182date:2011-07-12T00:00:00
db:NVDid:CVE-2010-0043date:2024-11-21T01:11:23.993

SOURCES RELEASE DATE

db:VULHUBid:VHN-42648date:2010-03-15T00:00:00
db:BIDid:38673date:2010-03-11T00:00:00
db:BIDid:38671date:2010-03-11T00:00:00
db:JVNDBid:JVNDB-2010-001183date:2010-03-25T00:00:00
db:PACKETSTORMid:87984date:2010-04-02T16:05:17
db:CNNVDid:CNNVD-201003-182date:2010-03-15T00:00:00
db:NVDid:CVE-2010-0043date:2010-03-15T13:28:25.433