VAR-200507-0224
Vulnerability from variot - Updated: 2023-12-18 11:24Safari version 2.0 (412) does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability.". An attacker may exploit this vulnerability to spoof an interface of a trusted web site. This issue may allow a remote attacker to carry out phishing style attacks. Safari is Apple's answer to browser software.
TITLE: Mac OS X Security Update Fixes Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA17813
VERIFY ADVISORY: http://secunia.com/advisories/17813/
CRITICAL: Highly critical
IMPACT: Security Bypass, Cross Site Scripting, Spoofing, Manipulation of data, Exposure of sensitive information, Privilege escalation, DoS, System access
WHERE:
From remote
OPERATING SYSTEM: Apple Macintosh OS X http://secunia.com/product/96/
DESCRIPTION: Apple has issued a security update for Mac OS X, which fixes 13 vulnerabilities.
1) An error in the handling of HTTP headers in the Apache 2 web server can be exploited by malicious people to conduct HTTP request smuggling attacks when Apache is used in conjunction with certain proxy servers, caching servers, or web application firewalls.
For more information: SA14530
2) An error in the Apache web server's "mod_ssl" module may be exploited by malicious people to bypass certain security restrictions.
For more information: SA16700
3) A boundary error exists in CoreFoundation when resolving certain URL. This can be exploited to cause a heap-based buffer overflow and may allow arbitrary code execution via a specially-crafted URL. CoreFoundation is used by Safari and other applications.
4) An error in curl when handling NTLM authentication can be exploited by malicious people to compromise a user's system.
For more information: SA17193
5) An error exists in the ODBC Administrator utility helper tool "iodbcadmintoo". This can be exploited by malicious, local users to execute commands with escalated privileges.
6) An error in OpenSSL when handling certain compatibility options can potentially be exploited by malicious people to perform protocol rollback attacks.
For more information: SA17151
7) An error in the passwordserver when handling the creation of an Open Directory master server may cause certain credentials to be disclosed. This can be exploited by unprivileged local users to gain elevated privileges on the server.
8) An integer overflow error exists in the PCRE library that is used by Safari's JavaScript engine. This can potentially be exploited by malicious people to compromise a user's system.
For more information: SA16502
9) An error exists in Safari when saving a downloaded file with an overly long filename. This can be exploited to cause the download file to be saved outside of the designated download directory.
10) JavaScript dialog boxes in Safari do not indicate the web site that created them.
For more information: SA15474
11) A boundary error exists in WebKit when handling certain specially crafted content. This can be exploited to cause a heap-based buffer overflow via content downloaded from malicious web sites in applications that use WebKit such as Safari.
12) An error in sudo can be exploited by malicious, local users to execute arbitrary commands with escalated privileges.
For more information: SA15744
13) The syslog server does not properly sanitise messages before recording them. This can be exploited to forge log entries and mislead the system administrator by supplying messages certaining control characters, such as the newline character, to the syslog server.
SOLUTION: Apply Security Update 2005-009.
Mac OS X 10.3.9 Client (Panther): http://www.apple.com/support/downloads/securityupdate2005009pantherclient.html
Mac OS X 10.3.9 Server (Panther): http://www.apple.com/support/downloads/securityupdate2005009pantherserver.html
Mac OS X 10.4.3 Client (Tiger): http://www.apple.com/support/downloads/securityupdate2005009tigerclient.html
Mac OS X 10.4.3 Server (Tiger): http://www.apple.com/support/downloads/securityupdate2005009tigerserver.html
PROVIDED AND/OR DISCOVERED BY: 10) Jakob Balle, Secunia Research. 11) Neil Archibald, Suresec LTD and Marco Mella. 13) HELIOS Software GmbH.
ORIGINAL ADVISORY: http://docs.info.apple.com/article.html?artnum=302847
OTHER REFERENCES: SA14530: http://secunia.com/advisories/14530/
SA16700: http://secunia.com/advisories/16700/
SA17193: http://secunia.com/advisories/17193/
SA17151: http://secunia.com/advisories/17151/
SA16502: http://secunia.com/advisories/16502/
SA15474: http://secunia.com/advisories/15474/
SA15744: http://secunia.com/advisories/15744/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
Bist Du interessiert an einem neuen Job in IT-Sicherheit?
Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/
TITLE: Safari Dialog Origin Spoofing Vulnerability
SECUNIA ADVISORY ID: SA15474
VERIFY ADVISORY: http://secunia.com/advisories/15474/
CRITICAL: Less critical
IMPACT: Spoofing
WHERE:
From remote
SOFTWARE: Safari 1.x http://secunia.com/product/1543/
DESCRIPTION: Secunia Research has discovered a vulnerability in Safari, which can be exploited by malicious web sites to spoof dialog boxes.
The problem is that JavaScript dialog boxes do not display or include their origin, which allows a new window to open e.g.
Secunia has constructed a test, which can be used to check if your browser is affected by this issue: http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/
The vulnerability has been confirmed in version 2.0 (412). Prior versions may also be affected.
SOLUTION: Do not browse untrusted web sites while browsing trusted sites
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200507-0224",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "safari",
"scope": "eq",
"trust": 1.6,
"vendor": "apple",
"version": "2.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.3"
},
{
"model": "safari",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.2.3"
},
{
"model": "safari",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.2.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.2.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.8"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.7"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.6"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.7"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.6"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3"
}
],
"sources": [
{
"db": "BID",
"id": "14011"
},
{
"db": "NVD",
"id": "CVE-2005-2272"
},
{
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2005-2272"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Jakob Balle of Secunia Research is credited with the discovery of this issue.",
"sources": [
{
"db": "BID",
"id": "14011"
},
{
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
],
"trust": 0.9
},
"cve": "CVE-2005-2272",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"id": "VHN-13481",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2005-2272",
"trust": 1.0,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-200507-173",
"trust": 0.6,
"value": "LOW"
},
{
"author": "VULHUB",
"id": "VHN-13481",
"trust": 0.1,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-13481"
},
{
"db": "NVD",
"id": "CVE-2005-2272"
},
{
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Safari version 2.0 (412) does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the \"Dialog Origin Spoofing Vulnerability.\". \nAn attacker may exploit this vulnerability to spoof an interface of a trusted web site. This issue may allow a remote attacker to carry out phishing style attacks. Safari is Apple\u0027s answer to browser software. \n\nTITLE:\nMac OS X Security Update Fixes Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA17813\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/17813/\n\nCRITICAL:\nHighly critical\n\nIMPACT:\nSecurity Bypass, Cross Site Scripting, Spoofing, Manipulation of\ndata, Exposure of sensitive information, Privilege escalation, DoS,\nSystem access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nApple Macintosh OS X\nhttp://secunia.com/product/96/\n\nDESCRIPTION:\nApple has issued a security update for Mac OS X, which fixes 13\nvulnerabilities. \n\n1) An error in the handling of HTTP headers in the Apache 2 web\nserver can be exploited by malicious people to conduct HTTP request\nsmuggling attacks when Apache is used in conjunction with certain\nproxy servers, caching servers, or web application firewalls. \n\nFor more information:\nSA14530\n\n2) An error in the Apache web server\u0027s \"mod_ssl\" module may be\nexploited by malicious people to bypass certain security\nrestrictions. \n\nFor more information:\nSA16700\n\n3) A boundary error exists in CoreFoundation when resolving certain\nURL. This can be exploited to cause a heap-based buffer overflow and\nmay allow arbitrary code execution via a specially-crafted URL. \nCoreFoundation is used by Safari and other applications. \n\n4) An error in curl when handling NTLM authentication can be\nexploited by malicious people to compromise a user\u0027s system. \n\nFor more information:\nSA17193\n\n5) An error exists in the ODBC Administrator utility helper tool\n\"iodbcadmintoo\". This can be exploited by malicious, local users to\nexecute commands with escalated privileges. \n\n6) An error in OpenSSL when handling certain compatibility options\ncan potentially be exploited by malicious people to perform protocol\nrollback attacks. \n\nFor more information:\nSA17151\n\n7) An error in the passwordserver when handling the creation of an\nOpen Directory master server may cause certain credentials to be\ndisclosed. This can be exploited by unprivileged local users to gain\nelevated privileges on the server. \n\n8) An integer overflow error exists in the PCRE library that is used\nby Safari\u0027s JavaScript engine. This can potentially be exploited by\nmalicious people to compromise a user\u0027s system. \n\nFor more information:\nSA16502\n\n9) An error exists in Safari when saving a downloaded file with an\noverly long filename. This can be exploited to cause the download\nfile to be saved outside of the designated download directory. \n\n10) JavaScript dialog boxes in Safari do not indicate the web site\nthat created them. \n\nFor more information:\nSA15474\n\n11) A boundary error exists in WebKit when handling certain specially\ncrafted content. This can be exploited to cause a heap-based buffer\noverflow via content downloaded from malicious web sites in\napplications that use WebKit such as Safari. \n\n12) An error in sudo can be exploited by malicious, local users to\nexecute arbitrary commands with escalated privileges. \n\nFor more information:\nSA15744\n\n13) The syslog server does not properly sanitise messages before\nrecording them. This can be exploited to forge log entries and\nmislead the system administrator by supplying messages certaining\ncontrol characters, such as the newline character, to the syslog\nserver. \n\nSOLUTION:\nApply Security Update 2005-009. \n\nMac OS X 10.3.9 Client (Panther):\nhttp://www.apple.com/support/downloads/securityupdate2005009pantherclient.html\n\nMac OS X 10.3.9 Server (Panther):\nhttp://www.apple.com/support/downloads/securityupdate2005009pantherserver.html\n\nMac OS X 10.4.3 Client (Tiger):\nhttp://www.apple.com/support/downloads/securityupdate2005009tigerclient.html\n\nMac OS X 10.4.3 Server (Tiger):\nhttp://www.apple.com/support/downloads/securityupdate2005009tigerserver.html\n\nPROVIDED AND/OR DISCOVERED BY:\n10) Jakob Balle, Secunia Research. \n11) Neil Archibald, Suresec LTD and Marco Mella. \n13) HELIOS Software GmbH. \n\nORIGINAL ADVISORY:\nhttp://docs.info.apple.com/article.html?artnum=302847\n\nOTHER REFERENCES:\nSA14530:\nhttp://secunia.com/advisories/14530/\n\nSA16700:\nhttp://secunia.com/advisories/16700/\n\nSA17193:\nhttp://secunia.com/advisories/17193/\n\nSA17151:\nhttp://secunia.com/advisories/17151/\n\nSA16502:\nhttp://secunia.com/advisories/16502/\n\nSA15474:\nhttp://secunia.com/advisories/15474/\n\nSA15744:\nhttp://secunia.com/advisories/15744/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\n----------------------------------------------------------------------\n\nBist Du interessiert an einem neuen Job in IT-Sicherheit?\n\n\nSecunia hat zwei freie Stellen als Junior und Senior Spezialist in IT-\nSicherheit:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nSafari Dialog Origin Spoofing Vulnerability\n\nSECUNIA ADVISORY ID:\nSA15474\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/15474/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSpoofing\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nSafari 1.x\nhttp://secunia.com/product/1543/\n\nDESCRIPTION:\nSecunia Research has discovered a vulnerability in Safari, which can\nbe exploited by malicious web sites to spoof dialog boxes. \n\nThe problem is that JavaScript dialog boxes do not display or include\ntheir origin, which allows a new window to open e.g. \n\nSecunia has constructed a test, which can be used to check if your\nbrowser is affected by this issue:\nhttp://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/\n\nThe vulnerability has been confirmed in version 2.0 (412). Prior\nversions may also be affected. \n\nSOLUTION:\nDo not browse untrusted web sites while browsing trusted sites",
"sources": [
{
"db": "NVD",
"id": "CVE-2005-2272"
},
{
"db": "BID",
"id": "14011"
},
{
"db": "VULHUB",
"id": "VHN-13481"
},
{
"db": "PACKETSTORM",
"id": "41892"
},
{
"db": "PACKETSTORM",
"id": "38206"
}
],
"trust": 1.44
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "14011",
"trust": 2.0
},
{
"db": "NVD",
"id": "CVE-2005-2272",
"trust": 2.0
},
{
"db": "SECUNIA",
"id": "15474",
"trust": 1.8
},
{
"db": "SECUNIA",
"id": "17813",
"trust": 1.8
},
{
"db": "OSVDB",
"id": "17397",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2005-2659",
"trust": 1.7
},
{
"db": "SECTRACK",
"id": "1015294",
"trust": 1.7
},
{
"db": "CNNVD",
"id": "CNNVD-200507-173",
"trust": 0.7
},
{
"db": "APPLE",
"id": "APPLE-SA-2005-11-29",
"trust": 0.6
},
{
"db": "XF",
"id": "21070",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-13481",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "41892",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "38206",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-13481"
},
{
"db": "BID",
"id": "14011"
},
{
"db": "PACKETSTORM",
"id": "41892"
},
{
"db": "PACKETSTORM",
"id": "38206"
},
{
"db": "NVD",
"id": "CVE-2005-2272"
},
{
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
]
},
"id": "VAR-200507-0224",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-13481"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T11:24:44.650000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2005-2272"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.8,
"url": "http://docs.info.apple.com/article.html?artnum=302847"
},
{
"trust": 1.8,
"url": "http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/bid/14011"
},
{
"trust": 1.7,
"url": "http://secunia.com/secunia_research/2005-12/advisory/"
},
{
"trust": 1.7,
"url": "http://www.osvdb.org/17397"
},
{
"trust": 1.7,
"url": "http://securitytracker.com/id?1015294"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/15474"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/17813"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2005/2659"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21070"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/21070"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2005/2659"
},
{
"trust": 0.3,
"url": "http://www.icab.de/"
},
{
"trust": 0.3,
"url": "http://www.apple.com/safari/"
},
{
"trust": 0.2,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.2,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.2,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.2,
"url": "http://secunia.com/advisories/15474/"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/securityupdate2005009pantherserver.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/15744/"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/securityupdate2005009tigerserver.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/14530/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/17813/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/16700/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/17193/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/96/"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/securityupdate2005009tigerclient.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/17151/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/16502/"
},
{
"trust": 0.1,
"url": "http://www.apple.com/support/downloads/securityupdate2005009pantherclient.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_vacancies/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/1543/"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_research/2005-12/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-13481"
},
{
"db": "BID",
"id": "14011"
},
{
"db": "PACKETSTORM",
"id": "41892"
},
{
"db": "PACKETSTORM",
"id": "38206"
},
{
"db": "NVD",
"id": "CVE-2005-2272"
},
{
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-13481"
},
{
"db": "BID",
"id": "14011"
},
{
"db": "PACKETSTORM",
"id": "41892"
},
{
"db": "PACKETSTORM",
"id": "38206"
},
{
"db": "NVD",
"id": "CVE-2005-2272"
},
{
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2005-07-13T00:00:00",
"db": "VULHUB",
"id": "VHN-13481"
},
{
"date": "2005-06-21T00:00:00",
"db": "BID",
"id": "14011"
},
{
"date": "2005-11-30T18:27:13",
"db": "PACKETSTORM",
"id": "41892"
},
{
"date": "2005-06-23T06:59:04",
"db": "PACKETSTORM",
"id": "38206"
},
{
"date": "2005-07-13T04:00:00",
"db": "NVD",
"id": "CVE-2005-2272"
},
{
"date": "2005-07-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-07-11T00:00:00",
"db": "VULHUB",
"id": "VHN-13481"
},
{
"date": "2006-08-23T23:54:00",
"db": "BID",
"id": "14011"
},
{
"date": "2017-07-11T01:32:47.610000",
"db": "NVD",
"id": "CVE-2005-2272"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Apple Safari Dialog spoofing vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access verification error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200507-173"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.