ID

VAR-201505-0083


CVE

CVE-2015-1154


TITLE

Apple Safari Used in etc. WebKit Vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2015-002546

DESCRIPTION

WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1153. Apple Safari Used in etc. WebKit is prone to an unspecified memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code within the context of the user running the affected application. Failed exploit attempts will likely cause denial-of-service conditions. Versions prior to Safari 8.0.6, 7.1.6, and 6.2.6 are vulnerable. Apple Safari is a web browser of Apple (Apple), the default browser included with Mac OS X and iOS operating systems. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2015-05-06-1 Safari 8.0.6, Safari 7.1.6, and Safari 6.2.6 Safari 8.0.6, Safari 7.1.6, and Safari 6.2.6 are now available and address the following: WebKit Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.3 Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2015-1152 : Apple CVE-2015-1153 : Apple CVE-2015-1154 : Apple WebKit History Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.3 Impact: Visiting a maliciously crafted website may compromise user information on the filesystem Description: A state management issue existed in Safari that allowed unprivileged origins to access contents on the filesystem. This issue was addressed through improved state management. CVE-ID CVE-2015-1155 : Joe Vennix of Rapid7 Inc. working with HP's Zero Day Initiative WebKit Page Loading Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, and OS X Yosemite v10.10.3 Impact: Visiting a malicious website by clicking a link may lead to user interface spoofing Description: An issue existed in the handling of the rel attribute in anchor elements. Target objects could get unauthorized access to link objects. This issue was addressed through improved link type adherence. Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.22 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJVSmEJAAoJEBcWfLTuOo7tixsP/1BA4ipZ+MJwPqMEkVmYHyCc 4RtNYjWB6gX7yRLA9x3FdSXo1XG9C+1mtnWV3Acp2sP/mtmhH9yjUrayqYANsBoe Qrunfhhhx19DLYJ4989Y2HzWa8TJCYf/48Sh8PS5Jaf0FXdEUsqy/vBv/XGZLLrD k60uzyLswMp12OVC14c9Ueq7dMWXscebl7CGkKxuBAfvYpcZdhbmDWg/kkRGruZJ Ezh6m4YAzBSaeuoibKKZbAVbHlH+xW8wThw3GHfnwfBvX03ZsgH5mdw2UWPgT+gG /wrllHKG/qpaPeS0WZDVbI8NxmQP/YK+Fall2yqAUwDX7xj9VDZAKVElst9CWl6U Y+jn8+MxTPLqAAnmvl/0zcsU5qR/DzsbqT6MVCDH0PqPspdzHfyT6d7sT/fBN2Ri ti3uw7YmQCCQzi16vcGZnFjlIMDHB+hp5slp7hiVvAjixclYmRE62WME9VT/lZBW Kqs+OE6ZQ4jsHX1uhGNdQzGgQbwHtoNkh8rge+VvMQZwMV/IMW9hnTzKStEOPpmz EZuJRsVA7ZNaVd+y22Vfb8jyrY7BLiALKGpPaZNkmkF/hRgQHsXiXwC69np/6Jcg 2fy1uEt7eWKNPzQo1oUMtJ1jLzBMIBZoH4UpbpFZaHfHx/KYl8Pi8IahK7PT/r96 d2NeGKt3ZU8rm9473KsB =EyH2 -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2015-1154 // JVNDB: JVNDB-2015-002546 // BID: 74526 // VULHUB: VHN-79115 // PACKETSTORM: 131803

AFFECTED PRODUCTS

vendor:applemodel:safariscope:eqversion:7.1.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.1.0

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.2

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.6

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.4

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.1.3

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.1.1

Trust: 1.6

vendor:applemodel:safariscope:eqversion:7.0.5

Trust: 1.6

vendor:applemodel:safariscope:eqversion:8.0.0

Trust: 1.0

vendor:applemodel:safariscope:eqversion:8.0.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:8.0.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.1.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:8.0.3

Trust: 1.0

vendor:applemodel:itunesscope:lteversion:12.1

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.1.4

Trust: 1.0

vendor:applemodel:safariscope:eqversion:7.0

Trust: 1.0

vendor:applemodel:safariscope:lteversion:6.2.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:8.0.5

Trust: 1.0

vendor:applemodel:safariscope:eqversion:8.0.2

Trust: 1.0

vendor:applemodel:safariscope:ltversion:(os x yosemite v10.10.3)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:6.2.6

Trust: 0.8

vendor:applemodel:safariscope:eqversion:7.1.6

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.x (os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.x (os x mountain lion v10.8.5)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x yosemite v10.10.3)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:(os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:itunesscope:eqversion:12.2

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:(windows 7)

Trust: 0.8

vendor:applemodel:safariscope:ltversion:7.x (os x mavericks v10.9.5)

Trust: 0.8

vendor:applemodel:safariscope:eqversion:8.0.6

Trust: 0.8

vendor:applemodel:safariscope:ltversion:8.x (os x yosemite v10.10.3)

Trust: 0.8

vendor:applemodel:itunesscope:ltversion:(windows 8)

Trust: 0.8

vendor:webkitmodel:open source project webkitscope:eqversion:0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.6

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:2.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:1.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.7

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.5

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.3

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:safariscope:eqversion:4

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.2

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3.1

Trust: 0.3

vendor:applemodel:safariscope:eqversion:3

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1.8

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:9.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.1

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:8.0.2.20

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.6

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.5

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2.2

Trust: 0.3

vendor:applemodel:itunesscope:eqversion:10.2

Trust: 0.3

sources: BID: 74526 // JVNDB: JVNDB-2015-002546 // CNNVD: CNNVD-201505-052 // NVD: CVE-2015-1154

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-1154
value: MEDIUM

Trust: 1.0

NVD: CVE-2015-1154
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201505-052
value: MEDIUM

Trust: 0.6

VULHUB: VHN-79115
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2015-1154
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-79115
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-79115 // JVNDB: JVNDB-2015-002546 // CNNVD: CNNVD-201505-052 // NVD: CVE-2015-1154

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2015-1154

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201505-052

TYPE

Unknown

Trust: 0.3

sources: BID: 74526

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-002546

PATCH

title:APPLE-SA-2015-05-06-1 Safari 8.0.6, Safari 7.1.6, and Safari 6.2.6url:http://lists.apple.com/archives/security-announce/2015/May/msg00000.html

Trust: 0.8

title:APPLE-SA-2015-06-30-6 iTunes 12.2url:http://lists.apple.com/archives/security-announce/2015/Jun/msg00006.html

Trust: 0.8

title:HT204826url:http://support.apple.com/en-us/HT204826

Trust: 0.8

title:HT204949url:http://support.apple.com/en-us/HT204949

Trust: 0.8

title:HT204826url:http://support.apple.com/ja-jp/HT204826

Trust: 0.8

title:HT204949url:http://support.apple.com/ja-jp/HT204949

Trust: 0.8

sources: JVNDB: JVNDB-2015-002546

EXTERNAL IDS

db:NVDid:CVE-2015-1154

Trust: 2.9

db:BIDid:74526

Trust: 1.4

db:SECTRACKid:1032270

Trust: 1.1

db:JVNid:JVNVU94416388

Trust: 0.8

db:JVNDBid:JVNDB-2015-002546

Trust: 0.8

db:CNNVDid:CNNVD-201505-052

Trust: 0.7

db:SECUNIAid:64409

Trust: 0.6

db:VULHUBid:VHN-79115

Trust: 0.1

db:PACKETSTORMid:131803

Trust: 0.1

sources: VULHUB: VHN-79115 // BID: 74526 // JVNDB: JVNDB-2015-002546 // PACKETSTORM: 131803 // CNNVD: CNNVD-201505-052 // NVD: CVE-2015-1154

REFERENCES

url:http://lists.apple.com/archives/security-announce/2015/may/msg00000.html

Trust: 1.7

url:https://support.apple.com/ht204826

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2015/jun/msg00006.html

Trust: 1.1

url:http://www.securityfocus.com/bid/74526

Trust: 1.1

url:https://support.apple.com/kb/ht204949

Trust: 1.1

url:http://www.securitytracker.com/id/1032270

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1154

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94416388/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1154

Trust: 0.8

url:http://secunia.com/advisories/64409

Trust: 0.6

url:http://www.apple.com/safari/download/

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2015-1152

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1154

Trust: 0.1

url:https://www.apple.com/support/security/pgp/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1156

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1155

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-1153

Trust: 0.1

url:http://support.apple.com/kb/ht201222

Trust: 0.1

url:http://gpgtools.org

Trust: 0.1

sources: VULHUB: VHN-79115 // BID: 74526 // JVNDB: JVNDB-2015-002546 // PACKETSTORM: 131803 // CNNVD: CNNVD-201505-052 // NVD: CVE-2015-1154

CREDITS

Apple

Trust: 0.4

sources: BID: 74526 // PACKETSTORM: 131803

SOURCES

db:VULHUBid:VHN-79115
db:BIDid:74526
db:JVNDBid:JVNDB-2015-002546
db:PACKETSTORMid:131803
db:CNNVDid:CNNVD-201505-052
db:NVDid:CVE-2015-1154

LAST UPDATE DATE

2024-11-23T21:11:47.027000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-79115date:2015-07-13T00:00:00
db:BIDid:74526date:2015-07-15T00:51:00
db:JVNDBid:JVNDB-2015-002546date:2015-07-07T00:00:00
db:CNNVDid:CNNVD-201505-052date:2015-05-08T00:00:00
db:NVDid:CVE-2015-1154date:2024-11-21T02:24:47.433

SOURCES RELEASE DATE

db:VULHUBid:VHN-79115date:2015-05-08T00:00:00
db:BIDid:74526date:2015-05-06T00:00:00
db:JVNDBid:JVNDB-2015-002546date:2015-05-11T00:00:00
db:PACKETSTORMid:131803date:2015-05-07T15:53:40
db:CNNVDid:CNNVD-201505-052date:2015-05-08T00:00:00
db:NVDid:CVE-2015-1154date:2015-05-08T00:59:02.717