CVE-2009-1725

HIGH
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.

References

http://lists.apple.com/archives/security-announce/2009/Jul/msg00000.html

http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html

http://osvdb.org/55739

http://secunia.com/advisories/35758

http://secunia.com/advisories/36057

http://secunia.com/advisories/36062

http://secunia.com/advisories/36347

http://secunia.com/advisories/36677

http://secunia.com/advisories/36790

http://secunia.com/advisories/37746

http://secunia.com/advisories/43068

http://support.apple.com/kb/HT3666

http://support.apple.com/kb/HT3860

http://websvn.kde.org/?view=rev&revision=1002162

http://websvn.kde.org/?view=rev&revision=1002163

http://websvn.kde.org/?view=rev&revision=1002164

http://www.debian.org/security/2009/dsa-1950

http://www.mandriva.com/security/advisories?name=MDVSA-2009:330

http://www.securityfocus.com/bid/35607

http://www.securitytracker.com/id?1022526

http://www.ubuntu.com/usn/USN-836-1

http://www.ubuntu.com/usn/USN-857-1

http://www.vupen.com/english/advisories/2009/1827

http://www.vupen.com/english/advisories/2011/0212

https://bugzilla.redhat.com/show_bug.cgi?id=513813

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5777

https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00931.html

https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00933.html

https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html

https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html

https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.html

https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.html

Details

Source: MITRE

Published: 2009-07-09

Updated: 2017-09-29

Type: CWE-189

Risk Information

CVSS v2

Base Score: 9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8.6

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*

cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* versions up to 4.0.1 (inclusive)

Configuration 2

AND

OR

cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:apple:iphone:*:*:*:*:*:*:*:*

Configuration 3

AND

OR

cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*

cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

OR

cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*

Tenable Plugins

View all (22 total)

IDNameProductFamilySeverity
75629openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
53764openSUSE Security Update : libwebkit (openSUSE-SU-2011:0024-1)NessusSuSE Local Security Checks
critical
53667openSUSE Security Update : kdelibs4 (openSUSE-SU-2010:1036-1)NessusSuSE Local Security Checks
high
51089SuSE 10 Security Update : kdelibs (ZYPP Patch Number 7217)NessusSuSE Local Security Checks
high
51088SuSE 11 Security Update : kdelibs (SAT Patch Number 3450)NessusSuSE Local Security Checks
high
48170Mandriva Linux Security Advisory : kdelibs4 (MDVSA-2010:027)NessusMandriva Local Security Checks
high
44852Debian DSA-1988-1 : qt4-x11 - several vulnerabilitiesNessusDebian Local Security Checks
high
44815Debian DSA-1950-1 : webkit - several vulnerabilitiesNessusDebian Local Security Checks
high
43613Mandriva Linux Security Advisory : kde (MDVSA-2009:346)NessusMandriva Local Security Checks
critical
42467Ubuntu 8.10 / 9.04 : qt4-x11 vulnerabilities (USN-857-1)NessusUbuntu Local Security Checks
high
41606Ubuntu 8.10 / 9.04 : webkit vulnerabilities (USN-836-1)NessusUbuntu Local Security Checks
high
5160Apple iOS 3.x < 3.1 Multiple VulnerabilitiesNessus Network MonitorMobile Devices
high
40681Fedora 10 : qt-4.5.2-2.fc10 (2009-8802)NessusFedora Local Security Checks
high
40680Fedora 11 : qt-4.5.2-2.fc11 (2009-8800)NessusFedora Local Security Checks
high
40414Fedora 10 : kdelibs-4.2.4-6.fc10 (2009-8049)NessusFedora Local Security Checks
high
40413Fedora 11 : kdelibs3-3.5.10-13.fc11 (2009-8046)NessusFedora Local Security Checks
high
40412Fedora 11 : kdelibs-4.2.4-6.fc11 (2009-8039)NessusFedora Local Security Checks
high
40411Fedora 10 : kdelibs3-3.5.10-13.fc10 (2009-8020)NessusFedora Local Security Checks
high
39768Mac OS X : Apple Safari < 4.0.2NessusMacOS X Local Security Checks
high
39767Safari < 4.0.2 Multiple VulnerabilitiesNessusWindows
high
5094Safari < 4.0.2 Multiple VulnerabilitiesNessus Network MonitorWeb Clients
medium
801004Safari < 4.0.2 Multiple VulnerabilitiesLog Correlation EngineWeb Clients
high