ID

VAR-201203-0204


CVE

CVE-2011-3443


TITLE

Apple Safari Used in WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2012-001606

DESCRIPTION

Use-after-free vulnerability in WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors related to improper list management for Cascading Style Sheets (CSS) @font-face rules. WebKit is prone to a remote code-execution vulnerability. An attacker can exploit this issue by tricking an unsuspecting victim into viewing a web page containing malicious content. A successful exploit will result in the execution of arbitrary attacker-supplied code in the context of the user running the affected application. Apple Apple Safari is a web browser developed by Apple (Apple), and is the default browser included with Mac OS X and iOS operating systems. A use-after-free vulnerability exists in versions of Apple Safari prior to 5.0.6

Trust: 2.07

sources: NVD: CVE-2011-3443 // JVNDB: JVNDB-2012-001606 // BID: 51035 // VULHUB: VHN-51388 // VULMON: CVE-2011-3443

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:1.2.5

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.2.4

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.1

Trust: 1.3

vendor:applemodel:safariscope:eqversion:4.0

Trust: 1.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.4b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0b1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:4.0.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.2b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.3.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.1.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.0b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.1b

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.3

Trust: 1.0

vendor:applemodel:safariscope:eqversion:2.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0b2

Trust: 1.0

vendor:applemodel:safariscope:lteversion:5.0.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.2.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.1.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:1.2

Trust: 1.0

vendor:applemodel:safariscope:eqversion:3.0.1

Trust: 1.0

vendor:applemodel:mac os xscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.5.8

Trust: 0.8

vendor:applemodel:safariscope:eqversion:5

Trust: 0.8

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.8

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:4

Trust: 0.3

vendor:applemodel:safari betascope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:neversion:5.0.6

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:neversion:5.1

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:5.0.6

Trust: 0.3

sources: BID: 51035 // JVNDB: JVNDB-2012-001606 // CNNVD: CNNVD-201203-004 // NVD: CVE-2011-3443

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-3443
value: HIGH

Trust: 1.0

NVD: CVE-2011-3443
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201203-004
value: HIGH

Trust: 0.6

VULHUB: VHN-51388
value: HIGH

Trust: 0.1

VULMON: CVE-2011-3443
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2011-3443
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-51388
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-51388 // VULMON: CVE-2011-3443 // JVNDB: JVNDB-2012-001606 // CNNVD: CNNVD-201203-004 // NVD: CVE-2011-3443

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-51388 // JVNDB: JVNDB-2012-001606 // NVD: CVE-2011-3443

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-004

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201203-004

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001606

PATCH

title:HT4808url:http://support.apple.com/kb/HT4808

Trust: 0.8

sources: JVNDB: JVNDB-2012-001606

EXTERNAL IDS

db:NVDid:CVE-2011-3443

Trust: 2.9

db:JVNDBid:JVNDB-2012-001606

Trust: 0.8

db:CNNVDid:CNNVD-201203-004

Trust: 0.7

db:IDEFENSEid:20111116 APPLE SAFARI FONT-FACE USE-AFTER-FREE VULNERABILITY

Trust: 0.6

db:BIDid:51035

Trust: 0.4

db:VULHUBid:VHN-51388

Trust: 0.1

db:VULMONid:CVE-2011-3443

Trust: 0.1

sources: VULHUB: VHN-51388 // VULMON: CVE-2011-3443 // BID: 51035 // JVNDB: JVNDB-2012-001606 // CNNVD: CNNVD-201203-004 // NVD: CVE-2011-3443

REFERENCES

url:http://support.apple.com/kb/ht4808

Trust: 2.1

url:http://www.verisigninc.com/products-and-services/network-intelligence-availability/idefense/public-vulnerability-reports/articles/index.xhtml?id=962

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3443

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3443

Trust: 0.8

url:http://labs.idefense.com/verisign/intelligence/2009/vulnerabilities/display.php?id=962

Trust: 0.3

url:http://www.apple.com/safari/

Trust: 0.3

url:http://www.webkit.org/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:http://tools.cisco.com/security/center/viewalert.x?alertid=24769

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-51388 // VULMON: CVE-2011-3443 // BID: 51035 // JVNDB: JVNDB-2012-001606 // CNNVD: CNNVD-201203-004 // NVD: CVE-2011-3443

CREDITS

anonymous via iDefense

Trust: 0.3

sources: BID: 51035

SOURCES

db:VULHUBid:VHN-51388
db:VULMONid:CVE-2011-3443
db:BIDid:51035
db:JVNDBid:JVNDB-2012-001606
db:CNNVDid:CNNVD-201203-004
db:NVDid:CVE-2011-3443

LAST UPDATE DATE

2024-11-23T22:49:43.061000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-51388date:2012-03-02T00:00:00
db:VULMONid:CVE-2011-3443date:2012-03-02T00:00:00
db:BIDid:51035date:2011-11-16T00:00:00
db:JVNDBid:JVNDB-2012-001606date:2012-03-05T00:00:00
db:CNNVDid:CNNVD-201203-004date:2012-03-02T00:00:00
db:NVDid:CVE-2011-3443date:2024-11-21T01:30:31.127

SOURCES RELEASE DATE

db:VULHUBid:VHN-51388date:2012-03-02T00:00:00
db:VULMONid:CVE-2011-3443date:2012-03-02T00:00:00
db:BIDid:51035date:2011-11-16T00:00:00
db:JVNDBid:JVNDB-2012-001606date:2012-03-05T00:00:00
db:CNNVDid:CNNVD-201203-004date:2012-03-02T00:00:00
db:NVDid:CVE-2011-3443date:2012-03-02T00:55:02.097