First published: Wed Mar 19 2008(Updated: )
WebCore, as used in Apple Safari before 3.1, does not properly mask the password field when reverse conversion is used with the Kotoeri input method, which allows physically proximate attackers to read the password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | =1.3.2 | |
Apple Safari | =3.0.4 | |
Apple Safari | =2.0.2 | |
Apple Safari | =3.0.1 | |
Apple Safari | =3.0.2 | |
Apple Safari | =1.0 | |
Apple Safari | =1.3 | |
Apple Safari | =3.0.3 | |
Apple Safari | =2.0 | |
Apple Safari | =0.8 | |
Apple Safari | =2.0.4 | |
Apple Safari | =1.1 | |
Apple Safari | =1.3.1 | |
Apple Safari | =1.2 | |
Apple Safari | =3.0 | |
Apple Safari | =0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1005 has a medium severity rating as it allows local attackers to read passwords.
To fix CVE-2008-1005, users should upgrade to a fixed version of Apple Safari that patches this vulnerability.
CVE-2008-1005 affects multiple versions of Apple Safari, specifically those prior to version 3.1.
CVE-2008-1005 can be exploited by physically proximate attackers who can access the victim's machine.
The implications of CVE-2008-1005 include the potential for unauthorized password disclosure, compromising user security.