CVE-2009-1701
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
10/06/2009
Last modified:
09/04/2025
Description
Use-after-free vulnerability in the JavaScript DOM implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by destroying a document.body element that has an unspecified XML container with elements that support the dir attribute.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* | 3.2.2 (including) | |
| cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:* | ||
| cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
- http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://osvdb.org/55008
- http://secunia.com/advisories/35379
- http://secunia.com/advisories/43068
- http://securitytracker.com/id?1022345=
- http://support.apple.com/kb/HT3613
- http://support.apple.com/kb/HT3639
- http://www.securityfocus.com/archive/1/504172/100/0/threaded
- http://www.securityfocus.com/bid/35260
- http://www.securityfocus.com/bid/35325
- http://www.vupen.com/english/advisories/2009/1522
- http://www.vupen.com/english/advisories/2009/1621
- http://www.vupen.com/english/advisories/2011/0212
- http://www.zerodayinitiative.com/advisories/ZDI-09-033/
- http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
- http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://osvdb.org/55008
- http://secunia.com/advisories/35379
- http://secunia.com/advisories/43068
- http://securitytracker.com/id?1022345=
- http://support.apple.com/kb/HT3613
- http://support.apple.com/kb/HT3639
- http://www.securityfocus.com/archive/1/504172/100/0/threaded
- http://www.securityfocus.com/bid/35260
- http://www.securityfocus.com/bid/35325
- http://www.vupen.com/english/advisories/2009/1522
- http://www.vupen.com/english/advisories/2009/1621
- http://www.vupen.com/english/advisories/2011/0212
- http://www.zerodayinitiative.com/advisories/ZDI-09-033/



