Vulnerabilities > CVE-2008-1024 - Resource Management Errors vulnerability in Apple Safari 3/3.1

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Apple Safari before 3.1.1, when running on Windows XP or Vista, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a file download with a crafted file name, which triggers memory corruption.

Vulnerable Configurations

Part Description Count
OS
Microsoft
2
Application
Apple
2

Common Weakness Enumeration (CWE)

Nessus

NASL familyWindows
NASL idSAFARI_3_1_1.NASL
descriptionThe version of Safari installed on the remote host reportedly is affected by several issues : - A malicious website can spoof window titles and URL bars (CVE-2007-2398). - A memory corruption issue in the file downloading capability could lead to a crash or arbitrary code execution (CVE-2008-1024). - A cross-site scripting vulnerability exists in WebKit
last seen2020-06-01
modified2020-06-02
plugin id31993
published2008-04-18
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/31993
titleSafari < 3.1.1 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(31993);
  script_version("1.14");
  script_cvs_date("Date: 2018/07/27 18:38:15");

  script_cve_id(
    "CVE-2007-2398",
    "CVE-2008-1024",
    "CVE-2008-1025",
    "CVE-2008-1026"
  );
  script_bugtraq_id(24484, 28813, 28814, 28815);
  script_xref(name:"Secunia", value:"29846");

  script_name(english:"Safari < 3.1.1 Multiple Vulnerabilities");
  script_summary(english:"Checks version number of Safari");

 script_set_attribute(attribute:"synopsis", value:
"The remote host contains a web browser that is affected by several
issues." );
 script_set_attribute(attribute:"description", value:
"The version of Safari installed on the remote host reportedly is
affected by several issues :

  - A malicious website can spoof window titles and URL bars
    (CVE-2007-2398).

  - A memory corruption issue in the file downloading
    capability could lead to a crash or arbitrary code
    execution (CVE-2008-1024).

  - A cross-site scripting vulnerability exists in WebKit's
    handling of URLs that contain a colon character in
    the host name (CVE-2008-1025).

  - A heap-based buffer overflow exists in WebKit's handling
    of JavaScript regular expressions (CVE-2008-1026)." );
  script_set_attribute(attribute:"see_also", value:"http://support.apple.com/kb/HT1467" );
  script_set_attribute(attribute:"see_also", value:"http://lists.apple.com/archives/security-announce/2008/Apr/msg00001.html" );
  script_set_attribute(attribute:"solution", value:
"Upgrade to Safari 3.1.1 or later." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(79, 119, 399);
  script_set_attribute(attribute:"plugin_publication_date", value: "2008/04/18");
  script_set_attribute(attribute:"vuln_publication_date", value: "2007/06/14");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:apple:safari");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");

  script_dependencies("safari_installed.nasl");
  script_require_keys("SMB/Safari/FileVersion");

  exit(0);
}


include("global_settings.inc");


ver = get_kb_item("SMB/Safari/FileVersion");
if (isnull(ver)) exit(0);

iver = split(ver, sep:'.', keep:FALSE);
for (i=0; i<max_index(iver); i++)
  iver[i] = int(iver[i]);

if (
  iver[0] < 3 ||
  (
    iver[0] == 3 &&
    (
      iver[1] < 525 ||
      (iver[1] == 525 && iver[2] < 17)
    )
  )
)
{
  if (report_verbosity)
  {
    prod_ver = get_kb_item("SMB/Safari/ProductVersion");
    if (!isnull(prod_ver)) ver = prod_ver;

    report = string(
      "\n",
      "Safari version ", ver, " is currently installed on the remote host.\n"
    );
    security_hole(port:get_kb_item("SMB/transport"), extra:report);
  }
  else security_hole(get_kb_item("SMB/transport"));
}

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 28813,28814,28815 CVE(CAN) ID: CVE-2008-1024,CVE-2008-1025,CVE-2008-1026 Safari是苹果家族操作系统默认所捆绑的WEB浏览器。 Safari实现上存在各种漏洞,远程攻击者可能利用这些漏洞控制用户系统。 如果用户使用Safari下载了带有特制名称的文件的话,就可能触发内存破坏,导致浏览器终止或执行任意指令。 Safari的WebKi没有正确地处理主机名中包含有冒号的URL,如果用户受骗打开特制的URL就会导致执行跨站脚本。 WebKit中的正则表达式编译器(JavaScriptCore/pcre/pcre_compile.cpp)中存在堆溢出漏洞。如果在正则表达式中嵌套了大量反复的话,就可以触发这个溢出,导致执行任意指令。 Apple Safari 3.1 Apple Safari 3 Robert Swiecki (<a href=mailto:[email protected] target=_blank>[email protected]</a>) Charlie Miller 链接:<a href=http://support.apple.com/kb/HT1467 target=_blank>http://support.apple.com/kb/HT1467</a> <a href=http://marc.info/?l=bugtraq&amp;m=120838537332599&amp;w=2 target=_blank>http://marc.info/?l=bugtraq&amp;m=120838537332599&amp;w=2</a>
idSSV:3186
last seen2017-11-19
modified2008-04-18
published2008-04-18
reporterRoot
titleApple Safari 3.1.1版本修复多个安全漏洞