CVE-2012-0592
WebKit.org Webkit Array.Splice Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
WebKit, tal y como se usa en Apple iTunes antes de v10.6 y Apple iOS antes de v5.1, permite a atacantes remotos ejecutar código de su elección o causar una denegación de servicio (corrupción de memoria y caída de la aplicación) a través de vectores relacionados con la navegación por un sitio web malicioso. Se trata de una vulnerabilidad diferente a otros CVEs de Webkit enumerados en el APPLE-SA-2012-03-07-1 y APPLE-SA-2012-03-07-2.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of WebKit. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The flaw exists within the JavaScriptCore component as used by WebKit. This module is responsible for the in browser implementation of JavaScript. When handling the array.splice method the browser improperly calculates the length, and thus allocation size for the newly modified array. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the browser.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2012-01-12 CVE Reserved
- 2012-03-08 CVE Published
- 2023-06-02 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/48274 | Third Party Advisory | |
http://secunia.com/advisories/48288 | Third Party Advisory | |
http://secunia.com/advisories/48377 | Third Party Advisory | |
http://www.securityfocus.com/bid/52365 | Third Party Advisory | |
http://www.securitytracker.com/id?1026774 | Third Party Advisory | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17488 | Signature |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apple Search vendor "Apple" | Iphone Os Search vendor "Apple" for product "Iphone Os" | < 5.1 Search vendor "Apple" for product "Iphone Os" and version " < 5.1" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Itunes Search vendor "Apple" for product "Itunes" | < 10.6 Search vendor "Apple" for product "Itunes" and version " < 10.6" | - |
Affected
|