Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2009-1690
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-10 Jun, 2009 | 14:30
Updated At-23 May, 2021 | 00:52

Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to "recursion in certain DOM event handlers."

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Apple Inc.
apple
>>safari>>Versions up to 4.0_beta(inclusive)
cpe:2.3:a:apple:safari:*:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>0.8
cpe:2.3:a:apple:safari:0.8:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>0.9
cpe:2.3:a:apple:safari:0.9:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>1.0
cpe:2.3:a:apple:safari:1.0:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>1.0.3
cpe:2.3:a:apple:safari:1.0.3:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>1.1
cpe:2.3:a:apple:safari:1.1:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>1.2
cpe:2.3:a:apple:safari:1.2:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>1.3
cpe:2.3:a:apple:safari:1.3:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>1.3.1
cpe:2.3:a:apple:safari:1.3.1:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>1.3.2
cpe:2.3:a:apple:safari:1.3.2:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>2.0
cpe:2.3:a:apple:safari:2.0:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>2.0.2
cpe:2.3:a:apple:safari:2.0.2:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>2.0.4
cpe:2.3:a:apple:safari:2.0.4:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.0
cpe:2.3:a:apple:safari:3.0:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.0.2
cpe:2.3:a:apple:safari:3.0.2:-:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.0.3
cpe:2.3:a:apple:safari:3.0.3:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.0.4
cpe:2.3:a:apple:safari:3.0.4:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.1
cpe:2.3:a:apple:safari:3.1:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.1.1
cpe:2.3:a:apple:safari:3.1.1:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.1.2
cpe:2.3:a:apple:safari:3.1.2:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.2.1
cpe:2.3:a:apple:safari:3.2.1:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.2.3
cpe:2.3:a:apple:safari:3.2.3:*:mac:*:*:*:*:*
Apple Inc.
apple
>>safari>>Versions up to 3.2.3(inclusive)
cpe:2.3:a:apple:safari:*:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.0
cpe:2.3:a:apple:safari:3.0:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.0.1
cpe:2.3:a:apple:safari:3.0.1:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.0.2
cpe:2.3:a:apple:safari:3.0.2:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.0.3
cpe:2.3:a:apple:safari:3.0.3:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.0.4
cpe:2.3:a:apple:safari:3.0.4:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.1
cpe:2.3:a:apple:safari:3.1:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.1.1
cpe:2.3:a:apple:safari:3.1.1:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.1.2
cpe:2.3:a:apple:safari:3.1.2:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.2
cpe:2.3:a:apple:safari:3.2:-:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.2.1
cpe:2.3:a:apple:safari:3.2.1:*:windows:*:*:*:*:*
Apple Inc.
apple
>>safari>>3.2.2
cpe:2.3:a:apple:safari:3.2.2:*:windows:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.0
cpe:2.3:o:apple:iphone_os:1.0:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.0.0
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.0.1
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.0.1
cpe:2.3:o:apple:iphone_os:1.0.1:-:iphone:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.0.2
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.0.2
cpe:2.3:o:apple:iphone_os:1.0.2:-:iphone:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1
cpe:2.3:o:apple:iphone_os:1.1:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1.0
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1.0
cpe:2.3:o:apple:iphone_os:1.1.0:-:iphone:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1.0
cpe:2.3:o:apple:iphone_os:1.1.0:-:ipodtouch:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1.1
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1.1
cpe:2.3:o:apple:iphone_os:1.1.1:-:iphone:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1.2
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1.2
cpe:2.3:o:apple:iphone_os:1.1.2:-:iphone:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1.2
cpe:2.3:o:apple:iphone_os:1.1.2:-:ipodtouch:*:*:*:*:*
Apple Inc.
apple
>>iphone_os>>1.1.3
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-399Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=803cve@mitre.org
N/A
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.htmlcve@mitre.org
Patch
Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.htmlcve@mitre.org
Patch
Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.htmlcve@mitre.org
N/A
http://osvdb.org/54990cve@mitre.org
N/A
http://secunia.com/advisories/35379cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36057cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36062cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36790cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/37746cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/43068cve@mitre.org
Vendor Advisory
http://securitytracker.com/id?1022345cve@mitre.org
Patch
http://support.apple.com/kb/HT3613cve@mitre.org
Patch
Vendor Advisory
http://support.apple.com/kb/HT3639cve@mitre.org
Patch
Vendor Advisory
http://www.debian.org/security/2009/dsa-1950cve@mitre.org
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330cve@mitre.org
N/A
http://www.securityfocus.com/bid/35260cve@mitre.org
Exploit
Patch
http://www.ubuntu.com/usn/USN-822-1cve@mitre.org
N/A
http://www.ubuntu.com/usn/USN-836-1cve@mitre.org
N/A
http://www.ubuntu.com/usn/USN-857-1cve@mitre.org
N/A
http://www.vupen.com/english/advisories/2009/1522cve@mitre.org
Patch
Vendor Advisory
http://www.vupen.com/english/advisories/2009/1621cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2011/0212cve@mitre.org
Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11009cve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01199.htmlcve@mitre.org
N/A
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01200.htmlcve@mitre.org
N/A
Change History
0Changes found

Details not found