[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97559

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2007-3944

Date: (C)2007-07-23   (M)2017-08-01
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Multiple heap-based buffer overflows in the Perl Compatible Regular Expressions (PCRE) library in the JavaScript engine in WebKit in Apple Safari 3 Beta before Update 3.0.3, and iPhone before 1.0.1, allow remote attackers to execute arbitrary code via certain JavaScript regular expressions. NOTE: this issue was originally reported only for MobileSafari on the iPhone. NOTE: it is not clear whether this stems from an issue in the original distribution of PCRE, which might already have a separate CVE identifier.

Reference:
SECTRACK-1018439
BID-25002
SECUNIA-26287
ADV-2007-2730
ADV-2007-2731
http://docs.info.apple.com/article.html?artnum=306173
http://docs.info.apple.com/article.html?artnum=306174
http://www.nytimes.com/2007/07/23/technology/23iphone.html?_r=1&adxnnl=1&adxnnlx=1185163364-1OTsRJvbylLamj17FY2wnw&oref=slogin
http://www.securityevaluators.com/iphone/
http://www.securityevaluators.com/iphone/exploitingiphone.pdf
iphone-safari-bo(35577)

CPE    3
cpe:/a:apple:safari:3.0
cpe:/o:apple:iphone_os:1.0.0
cpe:/a:apple:webkit
CWE    1
CWE-119

© 2013 SecPod Technologies