WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/52365 | vdb-entry x_refsource_BID |
http://www.securitytracker.com/id?1026774 | vdb-entry x_refsource_SECTRACK |
http://secunia.com/advisories/48377 | third-party-advisory x_refsource_SECUNIA |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17488 | vdb-entry signature x_refsource_OVAL |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html | vendor-advisory x_refsource_APPLE |
http://secunia.com/advisories/48274 | third-party-advisory x_refsource_SECUNIA |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html | vendor-advisory x_refsource_APPLE |
http://secunia.com/advisories/48288 | third-party-advisory x_refsource_SECUNIA |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html | vendor-advisory x_refsource_APPLE |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/52365 | vdb-entry x_refsource_BID x_transferred |
http://www.securitytracker.com/id?1026774 | vdb-entry x_refsource_SECTRACK x_transferred |
http://secunia.com/advisories/48377 | third-party-advisory x_refsource_SECUNIA x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17488 | vdb-entry signature x_refsource_OVAL x_transferred |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html | vendor-advisory x_refsource_APPLE x_transferred |
http://secunia.com/advisories/48274 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html | vendor-advisory x_refsource_APPLE x_transferred |
http://secunia.com/advisories/48288 | third-party-advisory x_refsource_SECUNIA x_transferred |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html | vendor-advisory x_refsource_APPLE x_transferred |
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 9.3 | HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Hyperlink | Source | Resource |
---|---|---|
http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html | product-security@apple.com | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html | product-security@apple.com | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html | product-security@apple.com | Mailing List Vendor Advisory |
http://secunia.com/advisories/48274 | product-security@apple.com | Third Party Advisory |
http://secunia.com/advisories/48288 | product-security@apple.com | Third Party Advisory |
http://secunia.com/advisories/48377 | product-security@apple.com | Third Party Advisory |
http://www.securityfocus.com/bid/52365 | product-security@apple.com | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1026774 | product-security@apple.com | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17488 | product-security@apple.com | Third Party Advisory |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00000.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00001.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://lists.apple.com/archives/security-announce/2012/Mar/msg00003.html | af854a3a-2127-422b-91ae-364da2661108 | Mailing List Vendor Advisory |
http://secunia.com/advisories/48274 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://secunia.com/advisories/48288 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://secunia.com/advisories/48377 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |
http://www.securityfocus.com/bid/52365 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1026774 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17488 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory |