ID

VAR-201003-1067


CVE

CVE-2010-0041


TITLE

Apple Safari of ImageIO Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2010-001181

DESCRIPTION

ImageIO in Apple Safari before 4.0.5 and iTunes before 9.1 on Windows does not ensure that memory access is associated with initialized memory, which allows remote attackers to obtain potentially sensitive information from process memory via a crafted BMP image. Apple Safari is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. This issue was previously documented in BID 38671 (Apple Safari Prior to 4.0.5 Multiple Security Vulnerabilities) but has been given its own record to better document it. Versions prior to Safari 4.0.5 on Microsoft Windows are vulnerable. These issues affect versions prior to Safari 4.0.5 running on Apple Mac OS X, Windows 7, XP and Vista. NOTE: This BID is being retired because the following individual records have been created to better document issues previously mentioned in this BID: 38674 Apple Safari Prior to 4.0.5 Integer Overflow Vulnerability 35451 LibTIFF 'LZWDecodeCompat()' Remote Buffer Underflow Vulnerability 38676 Apple Safari BMP Image Uninitialized Memory Information Disclosure Vulnerability 38677 Apple Safari TIFF Image Uninitialized Memory Information Disclosure Vulnerability 38673 Apple Safari ImageIO TIFF Image Remote Code Execution Vulnerability 38675 Apple Safari Prior to 4.0.5 Configuration Bypass Weakness 38683 Apple Safari URL Schemes Handling Remote Code Execution Vulnerability 38684 WebKit CSS 'format()' Arguments Memory Corruption Vulnerability 38687 WebKit Object Element Fallback Memory Corruption Vulnerability 38688 WebKit XML Document Parsing Memory Corruption Vulnerability 38689 WebKit Right-to-Left Displayed Text Handling Memory Corruption Vulnerability 38685 WebKit Nested HTML Tags Use-After-Free Error Remote Code Execution Vulnerability 38692 WebKit Cross-Origin Stylesheet Request Information Disclosure Vulnerability 38686 WebKit HTML Elements Callback Use-After-Free Error Remote Code Execution Vulnerability 38690 WebKit CSS Display Use-After-Free Error Remote Code Execution Vulnerability 38691 WebKit HTML Image Element Handling Memory Corruption Vulnerability. Safari is the web browser bundled by default in the Apple family machine operating system. Apple Safari versions earlier than 4.0.5 and ImageIO versions earlier than iTunes 9.1 based on the Windows platform have an information disclosure vulnerability in the processing of BMP graphics. ---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Apple iTunes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA39135 VERIFY ADVISORY: http://secunia.com/advisories/39135/ DESCRIPTION: Some vulnerabilities have been reported in Apple iTunes, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or compromise a user's system. 1) Multiple errors in the ColorSync and ImageIO components when handling images can be exploited to disclose application memory or potentially execute arbitrary code. For more information see vulnerabilities #1 through #4 and #9 in: SA38932 2) An error when processing MP4 files can be exploited to trigger the execution of an infinite loop and render the application unusable after its restart via e.g. a specially crafted podcast. 3) During installation iTunes for Windows installs and executes certain files in a directory in the ""%ALLUSERSPROFILE%\Application Data\" path. As standard permissions allows any user to write files to the path, this can be exploited to either create malicious files with specific names before installation or malicious libraries after installation, allowing execution of arbitrary code with SYSTEM privileges. SOLUTION: Update to version 9.1. PROVIDED AND/OR DISCOVERED BY: 2) The vendor credits Sojeong Hong, Sourcefire VRT 3) Jason Geffner, NGSSoftware CHANGELOG: 2010-03-31: Added additional information provided by NGSSoftware. ORIGINAL ADVISORY: http://support.apple.com/kb/HT4105 OTHER REFERENCES: SA38932: http://secunia.com/advisories/38932/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.34

sources: NVD: CVE-2010-0041 // JVNDB: JVNDB-2010-001181 // BID: 38676 // BID: 38671 // VULHUB: VHN-42646 // PACKETSTORM: 87984

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.6

vendor:applemodel:safariscope:lteversion:4.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.9

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:iosscope:eqversion:2.0 to 3.1.3

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:2.1 to 3.1.3

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:9.1

Trust: 0.8

vendor:applemodel:safariscope:ltversion:4.0.5

Trust: 0.8

vendor:applemodel:safari for windowsscope:eqversion:4.0.4

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.6

vendor:applemodel:safari for windowsscope:neversion:4.0.5

Trust: 0.6

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.3

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.3

Trust: 0.3

vendor:applemodel:itunesscope:neversion:9.1

Trust: 0.3

vendor:applemodel:iosscope:neversion:4

Trust: 0.3

vendor:applemodel:safariscope:neversion:4.0.5

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

sources: BID: 38676 // BID: 38671 // JVNDB: JVNDB-2010-001181 // CNNVD: CNNVD-201003-180 // NVD: CVE-2010-0041

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0041
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0041
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201003-180
value: MEDIUM

Trust: 0.6

VULHUB: VHN-42646
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-0041
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-42646
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-42646 // JVNDB: JVNDB-2010-001181 // CNNVD: CNNVD-201003-180 // NVD: CVE-2010-0041

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-42646 // JVNDB: JVNDB-2010-001181 // NVD: CVE-2010-0041

THREAT TYPE

network

Trust: 0.6

sources: BID: 38676 // BID: 38671

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201003-180

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001181

PATCH

title:HT4070url:http://support.apple.com/kb/HT4070

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077

Trust: 0.8

title:HT4105url:http://support.apple.com/kb/HT4105

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225

Trust: 0.8

title:HT4070url:http://support.apple.com/kb/HT4070?viewlocale=ja_JP

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077?viewlocale=ja_JP

Trust: 0.8

title:HT4105url:http://support.apple.com/kb/HT4105?viewlocale=ja_JP

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2010-001181

EXTERNAL IDS

db:BIDid:38676

Trust: 2.8

db:NVDid:CVE-2010-0041

Trust: 2.8

db:BIDid:38671

Trust: 2.0

db:SECUNIAid:39135

Trust: 1.2

db:SECTRACKid:1023706

Trust: 1.1

db:JVNDBid:JVNDB-2010-001181

Trust: 0.8

db:CNNVDid:CNNVD-201003-180

Trust: 0.7

db:APPLEid:APPLE-SA-2010-03-11-1

Trust: 0.6

db:NSFOCUSid:14628

Trust: 0.6

db:VULHUBid:VHN-42646

Trust: 0.1

db:PACKETSTORMid:87984

Trust: 0.1

sources: VULHUB: VHN-42646 // BID: 38676 // BID: 38671 // JVNDB: JVNDB-2010-001181 // PACKETSTORM: 87984 // CNNVD: CNNVD-201003-180 // NVD: CVE-2010-0041

REFERENCES

url:http://www.securityfocus.com/bid/38676

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2010/mar/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/38671

Trust: 1.7

url:http://support.apple.com/kb/ht4070

Trust: 1.7

url:http://support.apple.com/kb/ht4105

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00001.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010/jun/msg00003.html

Trust: 1.1

url:http://support.apple.com/kb/ht4077

Trust: 1.1

url:http://support.apple.com/kb/ht4225

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a6885

Trust: 1.1

url:http://www.securitytracker.com/id?1023706

Trust: 1.1

url:http://secunia.com/advisories/39135

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0041

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0041

Trust: 0.8

url:http://www.apple.com/safari/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/14628

Trust: 0.6

url:http://secunia.com/advisories/38932/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/39135/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-42646 // BID: 38676 // BID: 38671 // JVNDB: JVNDB-2010-001181 // PACKETSTORM: 87984 // CNNVD: CNNVD-201003-180 // NVD: CVE-2010-0041

CREDITS

Matthew Jurczyk Billy Rios Robert Swiecki robert@swiecki.net wushi wooshi@gmail.com

Trust: 0.6

sources: CNNVD: CNNVD-201003-180

SOURCES

db:VULHUBid:VHN-42646
db:BIDid:38676
db:BIDid:38671
db:JVNDBid:JVNDB-2010-001181
db:PACKETSTORMid:87984
db:CNNVDid:CNNVD-201003-180
db:NVDid:CVE-2010-0041

LAST UPDATE DATE

2024-11-23T21:09:24.690000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-42646date:2017-09-19T00:00:00
db:BIDid:38676date:2010-06-21T22:28:00
db:BIDid:38671date:2010-03-12T15:32:00
db:JVNDBid:JVNDB-2010-001181date:2010-07-13T00:00:00
db:CNNVDid:CNNVD-201003-180date:2010-03-15T00:00:00
db:NVDid:CVE-2010-0041date:2024-11-21T01:11:23.760

SOURCES RELEASE DATE

db:VULHUBid:VHN-42646date:2010-03-15T00:00:00
db:BIDid:38676date:2010-03-11T00:00:00
db:BIDid:38671date:2010-03-11T00:00:00
db:JVNDBid:JVNDB-2010-001181date:2010-03-25T00:00:00
db:PACKETSTORMid:87984date:2010-04-02T16:05:17
db:CNNVDid:CNNVD-201003-180date:2010-03-15T00:00:00
db:NVDid:CVE-2010-0041date:2010-03-15T13:28:25.370