Podatność CVE-2005-4504


Publikacja: 2005-12-22   Modyfikacja: 2012-02-12

Opis:
The khtml::RenderTableSection::ensureRows function in KHTMLParser in Apple Mac OS X 10.4.3 and earlier, as used by Safari and TextEdit, allows remote attackers to cause a denial of service (memory consumption and application crash) via HTML files with a large ROWSPAN attribute in a TD tag.

Producent: Apple
Produkt: Safari 
Wersje:
2.0.2
2.0.1
2.0
1.3
1.2.3
1.2.2
1.2.1
1.2
1.1
1.0
Produkt: Mac os x 
Wersje:
10.4.3
10.4.2
10.4.1
10.4
10.3.9
10.3.8
10.3.7
10.3.6
10.3.5
10.3.4
10.3.3
10.3.2
10.3.1
10.3
10.2.8
10.2.7
10.2.6
10.2.5
10.2.4
10.2.3
10.2.2
10.2.1
10.2
10.1.5
10.1.4
10.1.3
10.1.2
10.1.1
10.1
10.0.4
10.0.3
10.0.2
10.0.1
10.0
Produkt: Mac os x server 
Wersje:
10.4.3
10.4.2
10.4.1
10.4
10.3.9
10.3.8
10.3.7
10.3.6
10.3.5
10.3.4
10.3.3
10.3.2
10.3.1
10.3
10.2.8
10.2.7
10.2.6
10.2.5
10.2.4
10.2.3
10.2.2
10.2.1
10.2
10.1.5
10.1.4
10.1.3
10.1.2
10.1.1
10.1
10.0
Produkt: Textedit 
Wersje: 1.4;

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:N/A:C)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
7.8/10
6.9/10
10/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Zdalny
Niska
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Brak
Brak
Pełny

 Referencje:
http://docs.info.apple.com/article.html?artnum=303382
http://docs.info.apple.com/jarticle.html?artnum=303382-en
http://lists.apple.com/archives/security-announce/2006/Mar/msg00000.html
http://security-protocols.com/advisory/sp-x22-advisory.txt
http://www.kb.cert.org/vuls/id/351217
http://www.securityfocus.com/bid/16045
http://www.securityfocus.com/bid/16907
http://www.us-cert.gov/cas/techalerts/TA06-062A.html
http://www.vupen.com/english/advisories/2005/3058
http://www.vupen.com/english/advisories/2006/0791
https://exchange.xforce.ibmcloud.com/vulnerabilities/23819

Podobne CVE
CVE-2019-9506
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") tha...
CVE-2019-9518
Some HTTP/2 implementations are vulnerable to a flood of empty frames, potentially leading to a denial of service. The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONT...
CVE-2019-9517
Some HTTP/2 implementations are vulnerable to unconstrained interal data buffering, potentially leading to a denial of service. The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so...
CVE-2019-9516
Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater h...
CVE-2019-9515
Some HTTP/2 implementations are vulnerable to a settings flood, potentially leading to a denial of service. The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS f...
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the p...
CVE-2019-9513
Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the...
CVE-2019-9512
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this d...

Copyright 2019, cxsecurity.com

 

Back to Top