CVE-2008-2307
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
23/06/2008
Last modified:
09/04/2025
Description
Unspecified vulnerability in WebKit in Apple Safari before 3.1.2, as distributed in Mac OS X before 10.5.4, and standalone for Windows and Mac OS X 10.4, allows remote attackers to cause a denial of service (application crash) or execute arbitrary code via vectors involving JavaScript arrays that trigger memory corruption.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | 10.5.3 (including) | |
| cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html
- http://lists.apple.com/archives/security-announce/2008//Jun/msg00003.html
- http://secunia.com/advisories/30775
- http://secunia.com/advisories/30801
- http://secunia.com/advisories/30992
- http://secunia.com/advisories/31074
- http://support.apple.com/kb/HT2092
- http://support.apple.com/kb/HT2163
- http://support.apple.com/kb/HT2165
- http://www.kb.cert.org/vuls/id/361043
- http://www.securityfocus.com/bid/29836
- http://www.securitytracker.com/id?1020330=
- http://www.vupen.com/english/advisories/2008/1882/references
- http://www.vupen.com/english/advisories/2008/1980
- http://www.vupen.com/english/advisories/2008/1981/references
- http://www.vupen.com/english/advisories/2008/2094/references
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00279.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00319.html
- http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
- http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html
- http://lists.apple.com/archives/security-announce/2008//Jun/msg00003.html
- http://secunia.com/advisories/30775
- http://secunia.com/advisories/30801
- http://secunia.com/advisories/30992
- http://secunia.com/advisories/31074
- http://support.apple.com/kb/HT2092
- http://support.apple.com/kb/HT2163
- http://support.apple.com/kb/HT2165
- http://www.kb.cert.org/vuls/id/361043
- http://www.securityfocus.com/bid/29836
- http://www.securitytracker.com/id?1020330=
- http://www.vupen.com/english/advisories/2008/1882/references
- http://www.vupen.com/english/advisories/2008/1980
- http://www.vupen.com/english/advisories/2008/1981/references
- http://www.vupen.com/english/advisories/2008/2094/references
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00279.html
- https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00319.html



