ID

VAR-201302-0278


CVE

CVE-2013-0879


TITLE

Google Chrome Service disruption in ( Memory corruption ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-001644

DESCRIPTION

Google Chrome before 25.0.1364.97 on Windows and Linux, and before 25.0.1364.99 on Mac OS X, does not properly implement web audio nodes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. This vulnerability Webkit Vulnerability in Webkit Other products that use may also be affected.Service disruption by a third party ( Memory corruption ) There is a possibility of being affected unspecified, such as being in a state. Google Chrome is prone to a memory-corruption vulnerability. Successful exploits may allow an attacker to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts will result in a denial-of-service condition. Note: This issue was previously discussed in BID 58101 (Google Chrome Multiple Security Vulnerabilities), but has been moved to its own record to better document it. This may lead to a malicious alteration of the behavior of a form submission. For OS X Mountain Lion systems Safari 6.0.5 is included with OS X v10.8.4. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201309-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: Chromium, V8: Multiple vulnerabilities Date: September 24, 2013 Bugs: #442096, #444826, #445246, #446944, #451334, #453610, #458644, #460318, #460776, #463426, #470920, #472350, #476344, #479048, #481990 ID: 201309-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been reported in Chromium and V8, some of which may allow execution of arbitrary code. Background ========== Chromium is an open-source web browser project. V8 is Google's open source JavaScript engine. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-client/chromium < 29.0.1457.57 >= 29.0.1457.57 2 dev-lang/v8 < 3.18.5.14 >= 3.18.5.14 ------------------------------------------------------------------- 2 affected packages Description =========== Multiple vulnerabilities have been discovered in Chromium and V8. Please review the CVE identifiers and release notes referenced below for details. Impact ====== A context-dependent attacker could entice a user to open a specially crafted web site or JavaScript program using Chromium or V8, possibly resulting in the execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker may be able to bypass security restrictions or have other, unspecified, impact. Workaround ========== There is no known workaround at this time. Resolution ========== All Chromium users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=www-client/chromium-29.0.1457.57" All V8 users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/v8-3.18.5.14" References ========== [ 1 ] CVE-2012-5116 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5116 [ 2 ] CVE-2012-5117 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5117 [ 3 ] CVE-2012-5118 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5118 [ 4 ] CVE-2012-5119 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5119 [ 5 ] CVE-2012-5120 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5120 [ 6 ] CVE-2012-5121 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5121 [ 7 ] CVE-2012-5122 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5122 [ 8 ] CVE-2012-5123 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5123 [ 9 ] CVE-2012-5124 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5124 [ 10 ] CVE-2012-5125 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5125 [ 11 ] CVE-2012-5126 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5126 [ 12 ] CVE-2012-5127 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5127 [ 13 ] CVE-2012-5128 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5128 [ 14 ] CVE-2012-5130 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5130 [ 15 ] CVE-2012-5132 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5132 [ 16 ] CVE-2012-5133 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5133 [ 17 ] CVE-2012-5135 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5135 [ 18 ] CVE-2012-5136 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5136 [ 19 ] CVE-2012-5137 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5137 [ 20 ] CVE-2012-5138 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5138 [ 21 ] CVE-2012-5139 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5139 [ 22 ] CVE-2012-5140 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5140 [ 23 ] CVE-2012-5141 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5141 [ 24 ] CVE-2012-5142 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5142 [ 25 ] CVE-2012-5143 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5143 [ 26 ] CVE-2012-5144 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5144 [ 27 ] CVE-2012-5145 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5145 [ 28 ] CVE-2012-5146 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5146 [ 29 ] CVE-2012-5147 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5147 [ 30 ] CVE-2012-5148 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5148 [ 31 ] CVE-2012-5149 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5149 [ 32 ] CVE-2012-5150 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5150 [ 33 ] CVE-2012-5151 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5151 [ 34 ] CVE-2012-5152 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5152 [ 35 ] CVE-2012-5153 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5153 [ 36 ] CVE-2012-5154 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5154 [ 37 ] CVE-2013-0828 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0828 [ 38 ] CVE-2013-0829 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0829 [ 39 ] CVE-2013-0830 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0830 [ 40 ] CVE-2013-0831 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0831 [ 41 ] CVE-2013-0832 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0832 [ 42 ] CVE-2013-0833 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0833 [ 43 ] CVE-2013-0834 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0834 [ 44 ] CVE-2013-0835 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0835 [ 45 ] CVE-2013-0836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0836 [ 46 ] CVE-2013-0837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0837 [ 47 ] CVE-2013-0838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0838 [ 48 ] CVE-2013-0839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0839 [ 49 ] CVE-2013-0840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0840 [ 50 ] CVE-2013-0841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0841 [ 51 ] CVE-2013-0842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0842 [ 52 ] CVE-2013-0879 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0879 [ 53 ] CVE-2013-0880 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0880 [ 54 ] CVE-2013-0881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0881 [ 55 ] CVE-2013-0882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0882 [ 56 ] CVE-2013-0883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0883 [ 57 ] CVE-2013-0884 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0884 [ 58 ] CVE-2013-0885 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0885 [ 59 ] CVE-2013-0887 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0887 [ 60 ] CVE-2013-0888 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0888 [ 61 ] CVE-2013-0889 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0889 [ 62 ] CVE-2013-0890 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0890 [ 63 ] CVE-2013-0891 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0891 [ 64 ] CVE-2013-0892 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0892 [ 65 ] CVE-2013-0893 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0893 [ 66 ] CVE-2013-0894 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0894 [ 67 ] CVE-2013-0895 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0895 [ 68 ] CVE-2013-0896 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0896 [ 69 ] CVE-2013-0897 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0897 [ 70 ] CVE-2013-0898 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0898 [ 71 ] CVE-2013-0899 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0899 [ 72 ] CVE-2013-0900 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0900 [ 73 ] CVE-2013-0902 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0902 [ 74 ] CVE-2013-0903 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0903 [ 75 ] CVE-2013-0904 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0904 [ 76 ] CVE-2013-0905 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0905 [ 77 ] CVE-2013-0906 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0906 [ 78 ] CVE-2013-0907 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0907 [ 79 ] CVE-2013-0908 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0908 [ 80 ] CVE-2013-0909 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0909 [ 81 ] CVE-2013-0910 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0910 [ 82 ] CVE-2013-0911 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0911 [ 83 ] CVE-2013-0912 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0912 [ 84 ] CVE-2013-0916 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0916 [ 85 ] CVE-2013-0917 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0917 [ 86 ] CVE-2013-0918 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0918 [ 87 ] CVE-2013-0919 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0919 [ 88 ] CVE-2013-0920 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0920 [ 89 ] CVE-2013-0921 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0921 [ 90 ] CVE-2013-0922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0922 [ 91 ] CVE-2013-0923 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0923 [ 92 ] CVE-2013-0924 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0924 [ 93 ] CVE-2013-0925 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0925 [ 94 ] CVE-2013-0926 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0926 [ 95 ] CVE-2013-2836 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2836 [ 96 ] CVE-2013-2837 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2837 [ 97 ] CVE-2013-2838 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2838 [ 98 ] CVE-2013-2839 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2839 [ 99 ] CVE-2013-2840 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2840 [ 100 ] CVE-2013-2841 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2841 [ 101 ] CVE-2013-2842 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2842 [ 102 ] CVE-2013-2843 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2843 [ 103 ] CVE-2013-2844 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2844 [ 104 ] CVE-2013-2845 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2845 [ 105 ] CVE-2013-2846 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2846 [ 106 ] CVE-2013-2847 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2847 [ 107 ] CVE-2013-2848 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2848 [ 108 ] CVE-2013-2849 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2849 [ 109 ] CVE-2013-2853 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2853 [ 110 ] CVE-2013-2855 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2855 [ 111 ] CVE-2013-2856 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2856 [ 112 ] CVE-2013-2857 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2857 [ 113 ] CVE-2013-2858 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2858 [ 114 ] CVE-2013-2859 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2859 [ 115 ] CVE-2013-2860 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2860 [ 116 ] CVE-2013-2861 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2861 [ 117 ] CVE-2013-2862 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2862 [ 118 ] CVE-2013-2863 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2863 [ 119 ] CVE-2013-2865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2865 [ 120 ] CVE-2013-2867 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2867 [ 121 ] CVE-2013-2868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2868 [ 122 ] CVE-2013-2869 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2869 [ 123 ] CVE-2013-2870 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2870 [ 124 ] CVE-2013-2871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2871 [ 125 ] CVE-2013-2874 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2874 [ 126 ] CVE-2013-2875 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2875 [ 127 ] CVE-2013-2876 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2876 [ 128 ] CVE-2013-2877 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877 [ 129 ] CVE-2013-2878 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2878 [ 130 ] CVE-2013-2879 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2879 [ 131 ] CVE-2013-2880 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2880 [ 132 ] CVE-2013-2881 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2881 [ 133 ] CVE-2013-2882 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2882 [ 134 ] CVE-2013-2883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2883 [ 135 ] CVE-2013-2884 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2884 [ 136 ] CVE-2013-2885 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2885 [ 137 ] CVE-2013-2886 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2886 [ 138 ] CVE-2013-2887 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2887 [ 139 ] CVE-2013-2900 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2900 [ 140 ] CVE-2013-2901 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2901 [ 141 ] CVE-2013-2902 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2902 [ 142 ] CVE-2013-2903 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2903 [ 143 ] CVE-2013-2904 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2904 [ 144 ] CVE-2013-2905 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2905 [ 145 ] Release Notes 23.0.1271.64 http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html [ 146 ] Release Notes 23.0.1271.91 http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html [ 147 ] Release Notes 23.0.1271.95 http://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201309-16.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . In certain contexts, an active network attacker could present untrusted certificates to iTunes and they would be accepted without warning. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-09-18-2 iOS 7 iOS 7 is now available and addresses the following: Certificate Trust Policy Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Root certificates have been updated Description: Several certificates were added to or removed from the list of system roots. CoreGraphics Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JBIG2 encoded data in PDF files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1025 : Felix Groebert of the Google Security Team CoreMedia Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of Sorenson encoded movie files. This issue was addressed through improved bounds checking. CVE-ID CVE-2013-1019 : Tom Gallagher (Microsoft) & Paul Bates (Microsoft) working with HP's Zero Day Initiative Data Protection Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Apps could bypass passcode-attempt restrictions Description: A privilege separation issue existed in Data Protection. An app within the third-party sandbox could repeatedly attempt to determine the user's passcode regardless of the user's "Erase Data" setting. This issue was addressed by requiring additional entitlement checks. CVE-ID CVE-2013-0957 : Jin Han of the Institute for Infocomm Research working with Qiang Yan and Su Mon Kywe of Singapore Management University Data Security Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: TrustWave, a trusted root CA, has issued, and subsequently revoked, a sub-CA certificate from one of its trusted anchors. This sub-CA facilitated the interception of communications secured by Transport Layer Security (TLS). This update added the involved sub-CA certificate to OS X's list of untrusted certificates. CVE-ID CVE-2013-5134 dyld Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker who has arbitrary code execution on a device may be able to persist code execution across reboots Description: Multiple buffer overflows existed in dyld's openSharedCacheFile() function. These issues were addressed through improved bounds checking. CVE-ID CVE-2013-3950 : Stefan Esser File Systems Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker who can mount a non-HFS filesystem may be able to cause an unexpected system termination or arbitrary code execution with kernel privileges Description: A memory corruption issue existed in the handling of AppleDouble files. This issue was addressed by removing support for AppleDouble files. CVE-ID CVE-2013-3955 : Stefan Esser ImageIO Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution Description: A buffer overflow existed in the handling of JPEG2000 encoded data in PDF files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1026 : Felix Groebert of the Google Security Team IOKit Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Background applications could inject user interface events into the foreground app Description: It was possible for background applications to inject user interface events into the foreground application using the task completion or VoIP APIs. This issue was addressed by enforcing access controls on foreground and background processes that handle interface events. CVE-ID CVE-2013-5137 : Mackenzie Straight at Mobile Labs IOKitUser Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious local application could cause an unexpected system termination Description: A null pointer dereference existed in IOCatalogue. The issue was addressed through additional type checking. CVE-ID CVE-2013-5138 : Will Estes IOSerialFamily Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Executing a malicious application may result in arbitrary code execution within the kernel Description: An out of bounds array access existed in the IOSerialFamily driver. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-5139 : @dent1zt IPSec Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker may intercept data protected with IPSec Hybrid Auth Description: The DNS name of an IPSec Hybrid Auth server was not being matched against the certificate, allowing an attacker with a certificate for any server to impersonate any other. This issue was addressed by improved certificate checking. CVE-ID CVE-2013-1028 : Alexander Traud of www.traud.de Kernel Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A remote attacker can cause a device to unexpectedly restart Description: Sending an invalid packet fragment to a device can cause a kernel assert to trigger, leading to a device restart. The issue was addressed through additional validation of packet fragments. CVE-ID CVE-2013-5140 : Joonas Kuorilehto of Codenomicon, an anonymous researcher working with CERT-FI, Antti LevomAki and Lauri Virtanen of Vulnerability Analysis Group, Stonesoft Kernel Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A malicious local application could cause device hang Description: An integer truncation vulnerability in the kernel socket interface could be leveraged to force the CPU into an infinite loop. The issue was addressed by using a larger sized variable. CVE-ID CVE-2013-5141 : CESG Kernel Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker on a local network can cause a denial of service Description: An attacker on a local network can send specially crafted IPv6 ICMP packets and cause high CPU load. The issue was addressed by rate limiting ICMP packets before verifying their checksum. CVE-ID CVE-2011-2391 : Marc Heuse Kernel Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Kernel stack memory may be disclosed to local users Description: An information disclosure issue existed in the msgctl and segctl APIs. This issue was addressed by initializing data structures returned from the kernel. CVE-ID CVE-2013-5142 : Kenzley Alphonse of Kenx Technology, Inc Kernel Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Unprivileged processes could get access to the contents of kernel memory which could lead to privilege escalation Description: An information disclosure issue existed in the mach_port_space_info API. This issue was addressed by initializing the iin_collision field in structures returned from the kernel. CVE-ID CVE-2013-3953 : Stefan Esser Kernel Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Unprivileged processes may be able to cause an unexpected system termination or arbitrary code execution in the kernel Description: A memory corruption issue existed in the handling of arguments to the posix_spawn API. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-3954 : Stefan Esser Kext Management Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An unauthorized process may modify the set of loaded kernel extensions Description: An issue existed in kextd's handling of IPC messages from unauthenticated senders. This issue was addressed by adding additional authorization checks. CVE-ID CVE-2013-5145 : "Rainbow PRISM" libxml Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libxml. These issues were addressed by updating libxml to version 2.9.0. CVE-ID CVE-2011-3102 : Juri Aedla CVE-2012-0841 CVE-2012-2807 : Juri Aedla CVE-2012-5134 : Google Chrome Security Team (Juri Aedla) libxslt Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing a maliciously crafted web page may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in libxslt. These issues were addressed by updating libxslt to version 1.1.28. CVE-ID CVE-2012-2825 : Nicolas Gregoire CVE-2012-2870 : Nicolas Gregoire CVE-2012-2871 : Kai Lu of Fortinet's FortiGuard Labs, Nicolas Gregoire Passcode Lock Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to the device may be able to bypass the screen lock Description: A race condition issue existed in the handling of phone calls and SIM card ejection at the lock screen. This issue was addressed through improved lock state management. CVE-ID CVE-2013-5147 : videosdebarraquito Personal Hotspot Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: An attacker may be able to join a Personal Hotspot network Description: An issue existed in the generation of Personal Hotspot passwords, resulting in passwords that could be predicted by an attacker to join a user's Personal Hotspot. The issue was addressed by generating passwords with higher entropy. CVE-ID CVE-2013-4616 : Andreas Kurtz of NESO Security Labs and Daniel Metz of University Erlangen-Nuremberg Push Notifications Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: The push notification token may be disclosed to an app contrary to the user's decision Description: An information disclosure issue existed in push notification registration. Apps requesting access to the push notification access received the token before the user approved the app's use of push notifications. This issue was addressed by withholding access to the token until the user has approved access. CVE-ID CVE-2013-5149 : Jack Flintermann of Grouper, Inc. Safari Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: A memory corruption issue existed in the handling of XML files. This issue was addressed through additional bounds checking. CVE-ID CVE-2013-1036 : Kai Lu of Fortinet's FortiGuard Labs Safari Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: History of pages recently visited in an open tab may remain after clearing of history Description: Clearing Safari's history did not clear the back/forward history for open tabs. This issue was addressed by clearing the back/forward history. CVE-ID CVE-2013-5150 Safari Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Viewing files on a website may lead to script execution even when the server sends a 'Content-Type: text/plain' header Description: Mobile Safari sometimes treated files as HTML files even when the server sent a 'Content-Type: text/plain' header. This may lead to cross-site scripting on sites that allow users to upload files. This issue was addressed through improved handling of files when 'Content-Type: text/plain' is set. CVE-ID CVE-2013-5151 : Ben Toews of Github Safari Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a malicious website may allow an arbitrary URL to be displayed Description: A URL bar spoofing issue existed in Mobile Safari. This issue was addressed through improved URL tracking. CVE-ID CVE-2013-5152 : Keita Haga of keitahaga.com, Lukasz Pilorz of RBS Sandbox Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Applications that are scripts were not sandboxed Description: Third-party applications which used the #! syntax to run a script were sandboxed based on the identity of the script interpreter, not the script. The interpreter may not have a sandbox defined, leading to the application being run unsandboxed. This issue was addressed by creating the sandbox based on the identity of the script. CVE-ID CVE-2013-5154 : evad3rs Sandbox Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Applications can cause a system hang Description: Malicious third-party applications that wrote specific values to the /dev/random device could force the CPU to enter an infinite loop. This issue was addressed by preventing third-party applications from writing to /dev/random. CVE-ID CVE-2013-5155 : CESG Social Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Users recent Twitter activity could be disclosed on devices with no passcode. Description: An issue existed where it was possible to determine what Twitter accounts a user had recently interacted with. This issue was resolved by restricting access to the Twitter icon cache. CVE-ID CVE-2013-5158 : Jonathan Zdziarski Springboard Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: A person with physical access to a device in Lost Mode may be able to view notifications Description: An issue existed in the handling of notifications when a device is in Lost Mode. This update addresses the issue with improved lock state management. CVE-ID CVE-2013-5153 : Daniel Stangroom Telephony Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Malicious apps could interfere with or control telephony functionality Description: An access control issue existed in the telephony subsystem. Bypassing supported APIs, sandboxed apps could make requests directly to a system daemon interfering with or controlling telephony functionality. This issue was addressed by enforcing access controls on interfaces exposed by the telephony daemon. CVE-ID CVE-2013-5156 : Jin Han of the Institute for Infocomm Research working with Qiang Yan and Su Mon Kywe of Singapore Management University; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee from the Georgia Institute of Technology Twitter Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Sandboxed apps could send tweets without user interaction or permission Description: An access control issue existed in the Twitter subsystem. Bypassing supported APIs, sandboxed apps could make requests directly to a system daemon interfering with or controlling Twitter functionality. This issue was addressed by enforcing access controls on interfaces exposed by the Twitter daemon. CVE-ID CVE-2013-5157 : Jin Han of the Institute for Infocomm Research working with Qiang Yan and Su Mon Kywe of Singapore Management University; Tielei Wang, Kangjie Lu, Long Lu, Simon Chung, and Wenke Lee from the Georgia Institute of Technology WebKit Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2013-0879 : Atte Kettunen of OUSPG CVE-2013-0991 : Jay Civelli of the Chromium development community CVE-2013-0992 : Google Chrome Security Team (Martin Barbella) CVE-2013-0993 : Google Chrome Security Team (Inferno) CVE-2013-0994 : David German of Google CVE-2013-0995 : Google Chrome Security Team (Inferno) CVE-2013-0996 : Google Chrome Security Team (Inferno) CVE-2013-0997 : Vitaliy Toropov working with HP's Zero Day Initiative CVE-2013-0998 : pa_kt working with HP's Zero Day Initiative CVE-2013-0999 : pa_kt working with HP's Zero Day Initiative CVE-2013-1000 : Fermin J. Serna of the Google Security Team CVE-2013-1001 : Ryan Humenick CVE-2013-1002 : Sergey Glazunov CVE-2013-1003 : Google Chrome Security Team (Inferno) CVE-2013-1004 : Google Chrome Security Team (Martin Barbella) CVE-2013-1005 : Google Chrome Security Team (Martin Barbella) CVE-2013-1006 : Google Chrome Security Team (Martin Barbella) CVE-2013-1007 : Google Chrome Security Team (Inferno) CVE-2013-1008 : Sergey Glazunov CVE-2013-1010 : miaubiz CVE-2013-1037 : Google Chrome Security Team CVE-2013-1038 : Google Chrome Security Team CVE-2013-1039 : own-hero Research working with iDefense VCP CVE-2013-1040 : Google Chrome Security Team CVE-2013-1041 : Google Chrome Security Team CVE-2013-1042 : Google Chrome Security Team CVE-2013-1043 : Google Chrome Security Team CVE-2013-1044 : Apple CVE-2013-1045 : Google Chrome Security Team CVE-2013-1046 : Google Chrome Security Team CVE-2013-1047 : miaubiz CVE-2013-2842 : Cyril Cattiaux CVE-2013-5125 : Google Chrome Security Team CVE-2013-5126 : Apple CVE-2013-5127 : Google Chrome Security Team CVE-2013-5128 : Apple WebKit Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a malicious website may lead to information disclosure Description: An information disclosure issue existed in the handling of the window.webkitRequestAnimationFrame() API. A maliciously crafted website could use an iframe to determine if another site used window.webkitRequestAnimationFrame(). This issue was addressed through improved handling of window.webkitRequestAnimationFrame(). CVE-ID CVE-2013-5159 WebKit Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Copying and pasting a malicious HTML snippet may lead to a cross-site scripting attack Description: A cross-site scripting issue existed in the handling of copied and pasted data in HTML documents. This issue was addressed through additional validation of pasted content. CVE-ID CVE-2013-0926 : Aditya Gupta, Subho Halder, and Dev Kar of xys3c (xysec.com) WebKit Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-site scripting issue existed in the handling of iframes. This issue was addressed through improved origin tracking. CVE-ID CVE-2013-1012 : Subodh Iyengar and Erling Ellingsen of Facebook WebKit Available for: iPhone 3GS and later, iPod touch (4th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to an information disclosure Description: An information disclosure issue existed in XSSAuditor. This issue was addressed through improved handling of URLs. CVE-ID CVE-2013-2848 : Egor Homakov WebKit Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Dragging or pasting a selection may lead to a cross-site scripting attack Description: Dragging or pasting a selection from one site to another may allow scripts contained in the selection to be executed in the context of the new site. This issue is addressed through additional validation of content before a paste or a drag and drop operation. CVE-ID CVE-2013-5129 : Mario Heiderich WebKit Available for: iPhone 4 and later, iPod touch (5th generation) and later, iPad 2 and later Impact: Visiting a maliciously crafted website may lead to a cross- site scripting attack Description: A cross-site scripting issue existed in the handling of URLs. This issue was addressed through improved origin tracking. CVE-ID CVE-2013-5131 : Erling A Ellingsen Installation note: This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/itunes/ iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device. The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device. To check that the iPhone, iPod touch, or iPad has been updated: * Navigate to Settings * Select General * Select About. The version after applying this update will be "7.0". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJSOe4/AAoJEPefwLHPlZEwToUP/jUGETRBdUjwN/gMmQAtl6zN 0VUMbnsNH51Lhsr15p9EHYJUL97pajT0N1gdd8Q2l+2NHkQzQLJziXgsO6VFOX7e GoLNvlbyfoE0Ac9dSm9w7yi2lVf8bjGZKmEH0DAXzZD5s0ThiqPZCjTo8rCODMH2 TyQgkYtcXtrAHYaFe0dceWe3Q0ORu24cuFg0xeqX+7QvzK9mSeJWiN8OtimMzDni 5Dvgn7emHiuI6f3huQ25bEXK4gjN+CGwXg2RhQ7fwm9IeBdLnH1qKrFrrMHIhbrK ibvud5jLS0ltUH+XnfBkoCkBntOO11vYllti8oIGCgaa5NkVkEOKbHy9uh6riGHT KXYU/LfM8tt8Ax6iknn4mYC2QYbv7OIyzSfu/scWbeawsJb4OMx71oJrROTArgQG QthFQvFk7NSe5kQlNz+xQHI5LP/ZSHTKdwT69zPIzjWQBOdcZ+4GQvmMsbKIeZeY I2oIull2C7XYav8B0o+l4WlyEewNCOHQ8znapZnjCRKT/FF/ueG/WO0J4SEWUbQz Kf24sZtFtm51QekPS3vc1XHacqJLELD8ugtgYC3hh9vUqkLV3UxpLKvI8uoOPUDt SCV3qSpaxgBQtJWUZPq0MWVTDJKzX4MEB8e1p4jZAggEzfx9AdT0s7XyGm9H/UsR GowSVGG+cJtvrngVhy3E =dNVy -----END PGP SIGNATURE-----

Trust: 2.43

sources: NVD: CVE-2013-0879 // JVNDB: JVNDB-2013-001644 // BID: 59326 // VULHUB: VHN-60881 // PACKETSTORM: 121925 // PACKETSTORM: 123382 // PACKETSTORM: 121672 // PACKETSTORM: 123307 // PACKETSTORM: 123339

AFFECTED PRODUCTS

vendor:googlemodel:chromescope:ltversion:25.0.1364.99

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:25.0.1364.97

Trust: 1.0

vendor:googlemodel:chromescope:ltversion:25.0.1364.97 (windows and linux)

Trust: 0.8

vendor:googlemodel:chromescope:ltversion:25.0.1364.99 (mac os x)

Trust: 0.8

vendor:applemodel:tvscope:ltversion:6.0 (apple tv first 2 after generation )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipad 2 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (iphone 4 or later )

Trust: 0.8

vendor:applemodel:iosscope:ltversion:7 (ipod touch first 5 after generation )

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:11.0.3 (windows)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:6.0.5

Trust: 0.8

vendor:googlemodel:chromescope:eqversion:25.0.1364.24

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:25.0.1364.23

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:25.0.1364.21

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:25.0.1364.27

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:25.0.1364.25

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:25.0.1364.28

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:25.0.1364.29

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:25.0.1364.22

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:25.0.1364.31

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:25.0.1364.30

Trust: 0.6

vendor:googlemodel:chromescope:eqversion:8.0.552.220

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.101

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375127

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1042

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.4.0.80

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.21

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.223

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.81

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.46

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.303

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.168

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.70

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.36

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.20

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.53

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.300

Trust: 0.3

vendor:applemodel:tvscope:neversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.49

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.32

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.203

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.105

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:24.0.1312.70

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.211

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.18

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.47255

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:20.0.1132.43

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.221

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:23.0.1271.64

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19.0.1084.52

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.104

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.213

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.306

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.38

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.307

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375125

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.208

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.128

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.19

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.27

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.301

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.43

Trust: 0.3

vendor:googlemodel:chromescope:neversion:25

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:24.0.1312.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.89

Trust: 0.3

vendor:applemodel:ios betascope:eqversion:64

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.1

Trust: 0.3

vendor:applemodel:safariscope:neversion:6.0.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:24.0.1312.57

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.15

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.16

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491064

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.17

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.204

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.222

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.215

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.127

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:23.0.1271.97

Trust: 0.3

vendor:applemodel:ipod touchscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.65

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.225

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:3.0.195.24

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.21

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.142

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:22.0.1229.79

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.107

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.302

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.219

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.310

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.91275

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.375.55

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96379

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.33

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.218

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.217

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.224

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.103

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.112

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.71

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.100

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:23.0.1271.91

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.548.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.34

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.59

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.62

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37599

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.13

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12.0.742.91

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.78

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.3.1549

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.61

Trust: 0.3

vendor:applemodel:safari for windowsscope:neversion:6.0.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.308

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:9.0.597.84

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.210

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.550.0

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.82

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.56

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.50

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.37

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.89

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.120

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:22.0.1229.94

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.107

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.309

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.214

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:20.0.1132.57

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.209

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.30

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.202

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:iphonescope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.226

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.551.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.60

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.96365

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.31

Trust: 0.3

vendor:googlemodel:chromescope:neversion:25.0.1364.97

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.249.1045

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:20.0.1132.23

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.7

Trust: 0.3

vendor:googlemodel:chrome betascope:eqversion:3.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:24.0.1312.52

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:19

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:22.0.1229.92

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.249.78

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.201

Trust: 0.3

vendor:applemodel:tvscope:eqversion:5.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.31

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.11

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.696.68

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11.0.672.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.3

vendor:applemodel:ios for developerscope:eqversion:6

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.43

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874.121

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:12

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.163

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.549.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.44

Trust: 0.3

vendor:applemodel:iosscope:neversion:7

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.77

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.304

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.151

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.83

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:18.0.1025.162

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.207

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:23.0.1271.95

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.112

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.212

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.305

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:11

Trust: 0.3

vendor:applemodel:safariscope:eqversion:6.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.33

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:11.0.0.163

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:5.0.3

Trust: 0.3

vendor:googlemodel:chromescope:neversion:25.0.1364.99

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.216

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.237

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.344

Trust: 0.3

vendor:applemodel:ipadscope:eqversion:0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:6.0.472.53

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:7.0.517.41

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:15.0.874102

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.206

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.48

Trust: 0.3

vendor:applemodel:itunesscope:neversion:11.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.133

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6.1.7

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.79

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:13.0.782.215

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:10.0.648.205

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:8.0.552.200

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.186

Trust: 0.3

vendor:applemodel:safari for windowsscope:eqversion:6.0.1

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:1.0.154.64

Trust: 0.3

vendor:applemodel:iosscope:eqversion:6.0.2

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.0.211.0

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:17.0.963.46

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:21.0.1180.75

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:5.0.37586

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:16.0.912.63

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491059

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:4.1.2491036

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:0.2.149.29

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:14.0.835.202

Trust: 0.3

vendor:googlemodel:chromescope:eqversion:2.0.172.30

Trust: 0.3

sources: BID: 59326 // JVNDB: JVNDB-2013-001644 // CNNVD: CNNVD-201302-459 // NVD: CVE-2013-0879

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-0879
value: HIGH

Trust: 1.0

NVD: CVE-2013-0879
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201302-459
value: MEDIUM

Trust: 0.6

VULHUB: VHN-60881
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-0879
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-60881
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-60881 // JVNDB: JVNDB-2013-001644 // CNNVD: CNNVD-201302-459 // NVD: CVE-2013-0879

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-60881 // JVNDB: JVNDB-2013-001644 // NVD: CVE-2013-0879

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201302-459

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201302-459

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001644

PATCH

title:APPLE-SA-2013-05-16-1url:http://lists.apple.com/archives/security-announce/2013/May/msg00000.html

Trust: 0.8

title:APPLE-SA-2013-09-18-2url:http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html

Trust: 0.8

title:APPLE-SA-2013-06-04-1url:http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html

Trust: 0.8

title:HT5766url:http://support.apple.com/kb/HT5766

Trust: 0.8

title:HT5785url:http://support.apple.com/kb/HT5785

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935

Trust: 0.8

title:HT5934url:http://support.apple.com/kb/HT5934?viewlocale=ja_JP

Trust: 0.8

title:HT5935url:http://support.apple.com/kb/HT5935?viewlocale=ja_JP

Trust: 0.8

title:HT5785url:http://support.apple.com/kb/HT5785?viewlocale=ja_JP

Trust: 0.8

title:HT5766url:http://support.apple.com/kb/HT5766?viewlocale=ja_JP

Trust: 0.8

title:Google Chromeurl:http://www.google.co.jp/chrome/intl/ja/landing_ff_yt.html?hl=ja&hl=ja

Trust: 0.8

title:Stable Channel Updateurl:http://googlechromereleases.blogspot.jp/2013/02/stable-channel-update_21.html

Trust: 0.8

title:openSUSE-SU-2013:0454url:http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html

Trust: 0.8

title:Google Chrome25.0.1364.97url:http://123.124.177.30/web/xxk/bdxqById.tag?id=45333

Trust: 0.6

sources: JVNDB: JVNDB-2013-001644 // CNNVD: CNNVD-201302-459

EXTERNAL IDS

db:NVDid:CVE-2013-0879

Trust: 3.3

db:SECUNIAid:54886

Trust: 1.7

db:JVNid:JVNVU98681940

Trust: 0.8

db:JVNid:JVNVU91792294

Trust: 0.8

db:JVNid:JVNVU92876220

Trust: 0.8

db:JVNDBid:JVNDB-2013-001644

Trust: 0.8

db:CNNVDid:CNNVD-201302-459

Trust: 0.7

db:BIDid:59326

Trust: 0.4

db:PACKETSTORMid:121925

Trust: 0.2

db:VULHUBid:VHN-60881

Trust: 0.1

db:PACKETSTORMid:123382

Trust: 0.1

db:PACKETSTORMid:121672

Trust: 0.1

db:PACKETSTORMid:123307

Trust: 0.1

db:PACKETSTORMid:123339

Trust: 0.1

sources: VULHUB: VHN-60881 // BID: 59326 // JVNDB: JVNDB-2013-001644 // PACKETSTORM: 121925 // PACKETSTORM: 123382 // PACKETSTORM: 121672 // PACKETSTORM: 123307 // PACKETSTORM: 123339 // CNNVD: CNNVD-201302-459 // NVD: CVE-2013-0879

REFERENCES

url:http://lists.apple.com/archives/security-announce/2013/sep/msg00006.html

Trust: 2.0

url:http://googlechromereleases.blogspot.com/2013/02/stable-channel-update_21.html

Trust: 2.0

url:http://support.apple.com/kb/ht5785

Trust: 2.0

url:http://lists.apple.com/archives/security-announce/2013/jun/msg00001.html

Trust: 1.7

url:http://support.apple.com/kb/ht5934

Trust: 1.7

url:https://code.google.com/p/chromium/issues/detail?id=172243

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a16505

Trust: 1.7

url:http://secunia.com/advisories/54886

Trust: 1.7

url:http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0879

Trust: 0.8

url:http://jvn.jp/cert/jvnvu92876220/

Trust: 0.8

url:http://jvn.jp/cert/jvnvu91792294/index.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu98681940/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0879

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2013-0997

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2013-0996

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2013-0879

Trust: 0.4

url:http://support.apple.com/kb/ht1222

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2013-0995

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2013-0992

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2013-0993

Trust: 0.4

url:https://www.apple.com/support/security/pgp/

Trust: 0.4

url:http://gpgtools.org

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2013-0991

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2013-0994

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2013-0998

Trust: 0.4

url:http://www.google.com/chrome

Trust: 0.3

url:http://support.apple.com/kb/ht5935

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1000

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1001

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1003

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1005

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1002

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1004

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-0999

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1007

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1006

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2013-1010

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-0926

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-1008

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-0841

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-5134

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-2391

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-2807

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-2825

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-2871

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-2870

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2011-3102

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2013-1012

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1011

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1013

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1009

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1023

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5133

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0894

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2848

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2862

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5130

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2905

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2876

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0879

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5149

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5150

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5136

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0881

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2857

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5126

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5128

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0906

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2870

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201309-16.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5146

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2856

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0895

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0899

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0904

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/11/stable-channel-release-and-beta-channel.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2874

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5116

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0830

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5138

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5153

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0880

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0905

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2900

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5140

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2877

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2868

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0833

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0828

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2847

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0918

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0902

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2863

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2849

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0831

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0900

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5126

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/11/stable-channel-update.html

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0835

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5121

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5133

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0911

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0840

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0925

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0921

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0897

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0920

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0838

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0917

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0908

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2885

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5120

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0896

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0889

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0836

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5130

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5144

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5146

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5127

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2840

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5141

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5145

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2882

Trust: 0.1

url:http://googlechromereleases.blogspot.com/2012/11/stable-channel-update_29.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5143

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2880

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2878

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2859

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5125

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0882

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5137

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5144

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2879

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0919

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5118

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2867

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0923

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5119

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5122

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2902

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5125

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5122

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0892

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5120

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2855

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5117

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5121

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2846

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2887

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5152

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5128

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2869

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5117

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5132

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2903

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0837

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2842

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5124

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5143

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5123

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5135

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0884

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0885

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0829

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2844

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2861

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5142

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0890

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2865

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0841

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2883

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5116

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0893

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0916

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5154

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2860

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2884

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5145

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0922

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2871

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5118

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2901

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0839

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0924

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0912

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0909

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2904

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5132

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5119

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5148

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0832

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0898

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2841

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0842

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2858

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2886

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0891

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0903

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5151

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2845

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2881

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0907

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0834

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0926

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5138

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0910

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0888

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2853

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5139

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2836

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2875

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0887

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2843

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5137

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5123

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5147

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5140

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5139

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5141

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0912

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0956

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0961

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0954

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0960

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0955

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0948

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0959

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0952

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1014

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0958

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0949

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-3748

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2857

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0950

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0951

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0953

Trust: 0.1

url:http://www.apple.com/itunes/download/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-5112

Trust: 0.1

url:https://www.apple.com/itunes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-0957

Trust: 0.1

url:https://www.traud.de

Trust: 0.1

sources: VULHUB: VHN-60881 // BID: 59326 // JVNDB: JVNDB-2013-001644 // PACKETSTORM: 121925 // PACKETSTORM: 123382 // PACKETSTORM: 121672 // PACKETSTORM: 123307 // PACKETSTORM: 123339 // CNNVD: CNNVD-201302-459 // NVD: CVE-2013-0879

CREDITS

Apple

Trust: 0.4

sources: PACKETSTORM: 121925 // PACKETSTORM: 121672 // PACKETSTORM: 123307 // PACKETSTORM: 123339

SOURCES

db:VULHUBid:VHN-60881
db:BIDid:59326
db:JVNDBid:JVNDB-2013-001644
db:PACKETSTORMid:121925
db:PACKETSTORMid:123382
db:PACKETSTORMid:121672
db:PACKETSTORMid:123307
db:PACKETSTORMid:123339
db:CNNVDid:CNNVD-201302-459
db:NVDid:CVE-2013-0879

LAST UPDATE DATE

2024-11-23T20:59:19.981000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-60881date:2023-01-30T00:00:00
db:BIDid:59326date:2015-03-19T08:09:00
db:JVNDBid:JVNDB-2013-001644date:2013-10-15T00:00:00
db:CNNVDid:CNNVD-201302-459date:2023-02-01T00:00:00
db:NVDid:CVE-2013-0879date:2024-11-21T01:48:22.637

SOURCES RELEASE DATE

db:VULHUBid:VHN-60881date:2013-02-23T00:00:00
db:BIDid:59326date:2013-02-21T00:00:00
db:JVNDBid:JVNDB-2013-001644date:2013-02-26T00:00:00
db:PACKETSTORMid:121925date:2013-06-06T14:44:44
db:PACKETSTORMid:123382date:2013-09-24T22:44:00
db:PACKETSTORMid:121672date:2013-05-17T13:33:33
db:PACKETSTORMid:123307date:2013-09-19T01:58:16
db:PACKETSTORMid:123339date:2013-09-20T20:54:13
db:CNNVDid:CNNVD-201302-459date:2013-02-25T00:00:00
db:NVDid:CVE-2013-0879date:2013-02-23T21:55:00.967