First published: Mon Jul 14 2008(Updated: )
Safari on Apple iPhone before 2.0 and iPod touch before 2.0 misinterprets a menu button press as user confirmation for visiting a web site with a (1) self-signed or (2) invalid certificate, which makes it easier for remote attackers to spoof web sites.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone | =1.0 | |
Apple iPhone | =1.1.3 | |
Apple iPhone | =1.1.4 | |
Apple iPhone | =1.02 | |
Apple iPod touch | =1.1 | |
Apple iPod touch | =1.1.1 | |
Apple iPod touch | =1.1.2 | |
Apple iPod touch | =1.1.3 | |
Apple iPod touch | =1.1.4 | |
Apple iPhone OS | =1.0.1 | |
Apple iPhone OS | =1.0.2 | |
Apple iPhone OS | =1.1.1 | |
Apple iPhone OS | =1.1.2 | |
Apple Safari |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1589 is classified as a moderate severity vulnerability, which could allow remote attackers to spoof websites.
To fix CVE-2008-1589, users should update to the latest version of Safari that is compatible with their iPhone or iPod touch.
CVE-2008-1589 affects Safari on Apple iPhone before version 2.0 and iPod touch before version 2.0.
The potential impact of CVE-2008-1589 includes the ability for attackers to conduct phishing attacks by spoofing websites.
CVE-2008-1589 is less of a concern today as it affects outdated devices and software that are no longer widely used.