ID

VAR-201003-1095


CVE

CVE-2010-0042


TITLE

Apple Safari of ImageIO Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2010-001182

DESCRIPTION

ImageIO in Apple Safari before 4.0.5 and iTunes before 9.1 on Windows does not ensure that memory access is associated with initialized memory, which allows remote attackers to obtain potentially sensitive information from process memory via a crafted TIFF image. These issues affect versions prior to Safari 4.0.5 running on Apple Mac OS X, Windows 7, XP and Vista. NOTE: This BID is being retired because the following individual records have been created to better document issues previously mentioned in this BID: 38674 Apple Safari Prior to 4.0.5 Integer Overflow Vulnerability 35451 LibTIFF 'LZWDecodeCompat()' Remote Buffer Underflow Vulnerability 38676 Apple Safari BMP Image Uninitialized Memory Information Disclosure Vulnerability 38677 Apple Safari TIFF Image Uninitialized Memory Information Disclosure Vulnerability 38673 Apple Safari ImageIO TIFF Image Remote Code Execution Vulnerability 38675 Apple Safari Prior to 4.0.5 Configuration Bypass Weakness 38683 Apple Safari URL Schemes Handling Remote Code Execution Vulnerability 38684 WebKit CSS 'format()' Arguments Memory Corruption Vulnerability 38687 WebKit Object Element Fallback Memory Corruption Vulnerability 38688 WebKit XML Document Parsing Memory Corruption Vulnerability 38689 WebKit Right-to-Left Displayed Text Handling Memory Corruption Vulnerability 38685 WebKit Nested HTML Tags Use-After-Free Error Remote Code Execution Vulnerability 38692 WebKit Cross-Origin Stylesheet Request Information Disclosure Vulnerability 38686 WebKit HTML Elements Callback Use-After-Free Error Remote Code Execution Vulnerability 38690 WebKit CSS Display Use-After-Free Error Remote Code Execution Vulnerability 38691 WebKit HTML Image Element Handling Memory Corruption Vulnerability. Apple Safari is prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may lead to further attacks. This issue was previously documented in BID 38671 (Apple Safari Prior to 4.0.5 Multiple Security Vulnerabilities) but has been given its own record to better document it. Versions prior to Safari 4.0.5 on Microsoft Windows are vulnerable. Safari is the web browser bundled by default in the Apple family machine operating system. Apple Safari 4.0.5 based on Windows platform and ImageIO of versions earlier than iTunes 9.1 have an information disclosure vulnerability when processing TIFF graphics. ---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Apple iTunes Multiple Vulnerabilities SECUNIA ADVISORY ID: SA39135 VERIFY ADVISORY: http://secunia.com/advisories/39135/ DESCRIPTION: Some vulnerabilities have been reported in Apple iTunes, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or compromise a user's system. 1) Multiple errors in the ColorSync and ImageIO components when handling images can be exploited to disclose application memory or potentially execute arbitrary code. For more information see vulnerabilities #1 through #4 and #9 in: SA38932 2) An error when processing MP4 files can be exploited to trigger the execution of an infinite loop and render the application unusable after its restart via e.g. a specially crafted podcast. 3) During installation iTunes for Windows installs and executes certain files in a directory in the ""%ALLUSERSPROFILE%\Application Data\" path. As standard permissions allows any user to write files to the path, this can be exploited to either create malicious files with specific names before installation or malicious libraries after installation, allowing execution of arbitrary code with SYSTEM privileges. SOLUTION: Update to version 9.1. PROVIDED AND/OR DISCOVERED BY: 2) The vendor credits Sojeong Hong, Sourcefire VRT 3) Jason Geffner, NGSSoftware CHANGELOG: 2010-03-31: Added additional information provided by NGSSoftware. ORIGINAL ADVISORY: http://support.apple.com/kb/HT4105 OTHER REFERENCES: SA38932: http://secunia.com/advisories/38932/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ---------------------------------------------------------------------- Secure your corporate defenses and reduce complexity in handling vulnerability threats with the new Secunia Vulnerability Intelligence Manager (VIM). For more information: SA40257 SA41328 SA42151 SA42312 SOLUTION: Upgrade to iOS 4.2 (downloadable and installable via iTunes)

Trust: 2.43

sources: NVD: CVE-2010-0042 // JVNDB: JVNDB-2010-001182 // BID: 38671 // BID: 38677 // VULHUB: VHN-42647 // PACKETSTORM: 87984 // PACKETSTORM: 96086

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 1.9

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.6

vendor:applemodel:safariscope:lteversion:4.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.9

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.2

Trust: 0.8

vendor:applemodel:iosscope:eqversion:2.0 to 3.1.3

Trust: 0.8

vendor:applemodel:iosscope:eqversion:3.2 to 3.2.2 (ipad for )

Trust: 0.8

vendor:applemodel:ios for ipod touchscope:eqversion:2.1 to 3.1.3

Trust: 0.8

vendor:applemodel:ipadscope: - version: -

Trust: 0.8

vendor:applemodel:iphonescope: - version: -

Trust: 0.8

vendor:applemodel:ipod touchscope: - version: -

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:9.1

Trust: 0.8

vendor:applemodel:safariscope:ltversion:4.0.5

Trust: 0.8

vendor:applemodel:safari for windowsscope:eqversion:4.0.4

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.6

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.6

vendor:applemodel:safari for windowsscope:neversion:4.0.5

Trust: 0.6

vendor:applemodel:safariscope:neversion:4.0.5

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.0.1

Trust: 0.3

vendor:applemodel:iosscope:neversion:4

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:itunesscope:neversion:9.1

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:4.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.5.8

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:iosscope:neversion:4.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.1

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.2

Trust: 0.3

vendor:applemodel:iosscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2.2

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:3.1.3

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.1

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:2.0

Trust: 0.3

vendor:applemodel:iosscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:3.0

Trust: 0.3

sources: BID: 38671 // BID: 38677 // JVNDB: JVNDB-2010-001182 // CNNVD: CNNVD-201003-181 // NVD: CVE-2010-0042

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0042
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0042
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201003-181
value: MEDIUM

Trust: 0.6

VULHUB: VHN-42647
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-0042
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-42647
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-42647 // JVNDB: JVNDB-2010-001182 // CNNVD: CNNVD-201003-181 // NVD: CVE-2010-0042

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-42647 // JVNDB: JVNDB-2010-001182 // NVD: CVE-2010-0042

THREAT TYPE

network

Trust: 0.6

sources: BID: 38671 // BID: 38677

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201003-181

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001182

PATCH

title:HT4070url:http://support.apple.com/kb/HT4070

Trust: 0.8

title:HT4456url:http://support.apple.com/kb/HT4456

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077

Trust: 0.8

title:HT4105url:http://support.apple.com/kb/HT4105

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225

Trust: 0.8

title:HT4070url:http://support.apple.com/kb/HT4070?viewlocale=ja_JP

Trust: 0.8

title:HT4077url:http://support.apple.com/kb/HT4077?viewlocale=ja_JP

Trust: 0.8

title:HT4105url:http://support.apple.com/kb/HT4105?viewlocale=ja_JP

Trust: 0.8

title:HT4225url:http://support.apple.com/kb/HT4225?viewlocale=ja_JP

Trust: 0.8

sources: JVNDB: JVNDB-2010-001182

EXTERNAL IDS

db:NVDid:CVE-2010-0042

Trust: 2.8

db:BIDid:38677

Trust: 2.8

db:BIDid:38671

Trust: 2.0

db:SECUNIAid:39135

Trust: 1.2

db:SECUNIAid:42314

Trust: 1.2

db:SECTRACKid:1023706

Trust: 1.1

db:JVNDBid:JVNDB-2010-001182

Trust: 0.8

db:CNNVDid:CNNVD-201003-181

Trust: 0.7

db:APPLEid:APPLE-SA-2010-03-11-1

Trust: 0.6

db:NSFOCUSid:14628

Trust: 0.6

db:VULHUBid:VHN-42647

Trust: 0.1

db:PACKETSTORMid:87984

Trust: 0.1

db:PACKETSTORMid:96086

Trust: 0.1

sources: VULHUB: VHN-42647 // BID: 38671 // BID: 38677 // JVNDB: JVNDB-2010-001182 // PACKETSTORM: 87984 // PACKETSTORM: 96086 // CNNVD: CNNVD-201003-181 // NVD: CVE-2010-0042

REFERENCES

url:http://www.securityfocus.com/bid/38677

Trust: 2.5

url:http://lists.apple.com/archives/security-announce/2010/mar/msg00000.html

Trust: 1.7

url:http://www.securityfocus.com/bid/38671

Trust: 1.7

url:http://support.apple.com/kb/ht4070

Trust: 1.7

url:http://support.apple.com/kb/ht4105

Trust: 1.2

url:http://support.apple.com/kb/ht4456

Trust: 1.2

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00001.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010//mar/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010/jun/msg00003.html

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2010//nov/msg00003.html

Trust: 1.1

url:http://support.apple.com/kb/ht4077

Trust: 1.1

url:http://support.apple.com/kb/ht4225

Trust: 1.1

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7561

Trust: 1.1

url:http://www.securitytracker.com/id?1023706

Trust: 1.1

url:http://secunia.com/advisories/39135

Trust: 1.1

url:http://secunia.com/advisories/42314

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0042

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0042

Trust: 0.8

url:http://www.apple.com/safari/

Trust: 0.6

url:http://www.nsfocus.net/vulndb/14628

Trust: 0.6

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/38932/

Trust: 0.1

url:http://secunia.com/advisories/39135/

Trust: 0.1

url:http://secunia.com/products/corporate/evm/

Trust: 0.1

url:http://secunia.com/advisories/42314/

Trust: 0.1

url:http://secunia.com/products/corporate/vim/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/advisories/42314/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=42314

Trust: 0.1

sources: VULHUB: VHN-42647 // BID: 38671 // BID: 38677 // JVNDB: JVNDB-2010-001182 // PACKETSTORM: 87984 // PACKETSTORM: 96086 // CNNVD: CNNVD-201003-181 // NVD: CVE-2010-0042

CREDITS

Matthew Jurczyk Billy Rios Robert Swiecki robert@swiecki.net wushi wooshi@gmail.com

Trust: 0.6

sources: CNNVD: CNNVD-201003-181

SOURCES

db:VULHUBid:VHN-42647
db:BIDid:38671
db:BIDid:38677
db:JVNDBid:JVNDB-2010-001182
db:PACKETSTORMid:87984
db:PACKETSTORMid:96086
db:CNNVDid:CNNVD-201003-181
db:NVDid:CVE-2010-0042

LAST UPDATE DATE

2024-11-23T19:26:27.072000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-42647date:2017-09-19T00:00:00
db:BIDid:38671date:2010-03-12T15:32:00
db:BIDid:38677date:2010-11-22T18:56:00
db:JVNDBid:JVNDB-2010-001182date:2010-12-10T00:00:00
db:CNNVDid:CNNVD-201003-181date:2010-03-15T00:00:00
db:NVDid:CVE-2010-0042date:2024-11-21T01:11:23.877

SOURCES RELEASE DATE

db:VULHUBid:VHN-42647date:2010-03-15T00:00:00
db:BIDid:38671date:2010-03-11T00:00:00
db:BIDid:38677date:2010-03-11T00:00:00
db:JVNDBid:JVNDB-2010-001182date:2010-03-25T00:00:00
db:PACKETSTORMid:87984date:2010-04-02T16:05:17
db:PACKETSTORMid:96086date:2010-11-24T11:53:31
db:CNNVDid:CNNVD-201003-181date:2010-03-15T00:00:00
db:NVDid:CVE-2010-0042date:2010-03-15T13:28:25.403