First published: Tue Apr 17 2007(Updated: )
International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Server | =10.5.2 | |
Apple iOS and macOS | =10.5.6 | |
Apple iOS and macOS | =10.5.5 | |
Apple macOS Server | =10.5.5 | |
Apple iOS and macOS | =10.5.1 | |
Apple macOS Server | =10.5.1 | |
Apple macOS Server | =10.5.6 | |
Apple iOS and macOS | =10.5.3 | |
Apple iOS and macOS | =10.5.0 | |
Apple macOS Server | =10.5.0 | |
Apple macOS Server | =10.5.3 | |
Apple macOS Server | =10.5.4 | |
Apple iOS and macOS | =10.5.2 | |
Apple iOS and macOS | =10.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0153 has a severity rating that can potentially lead to application crashes or unexpected behavior due to improper handling of byte sequences.
To fix CVE-2009-0153, update your operating system to the latest version that mitigates this vulnerability, such as Apple Mac OS X 10.5.7 or later.
CVE-2009-0153 affects International Components for Unicode (ICU) in versions 4.0, 3.6, and other 3.x as utilized in several Apple Mac OS X and iPhone OS versions before 10.5.7.
CVE-2009-0153 may allow remote exploitation through crafted Unicode data due to improper input validation.
The impact of CVE-2009-0153 on users includes potential application crashes and exploitation risks if the affected software processes malformed byte sequences.