First published: Fri Jun 19 2009(Updated: )
WebKit before r41741, as used in Apple iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Safari, and other software, allows remote attackers to cause a denial of service (memory consumption or device reset) via a web page containing an HTMLSelectElement object with a large length attribute, related to the length property of a Select object.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Safari | ||
iPhone OS | =1.0.0 | |
iPhone OS | =1.0.1 | |
iPhone OS | =1.0.2 | |
iPhone OS | =1.1.0 | |
iPhone OS | =1.1.1 | |
iPhone OS | =1.1.2 | |
iPhone OS | =1.1.3 | |
iPhone OS | =1.1.4 | |
iPhone OS | =1.1.5 | |
iPhone OS | =2.0 | |
iPhone OS | =2.0.0 | |
iPhone OS | =2.0.1 | |
iPhone OS | =2.0.2 | |
iPhone OS | =2.1 | |
iPhone OS | =2.1.1 | |
iPhone OS | =2.2 | |
iPhone OS | =2.2.1 | |
iPhone OS | ||
Apple iPod touch |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1692 has a severity rating of medium, as it allows for denial of service through memory consumption or device resets.
The best way to fix CVE-2009-1692 is to update the affected Apple software to the latest version that addresses this vulnerability.
CVE-2009-1692 affects multiple versions of Apple Safari, specifically those prior to version 4.0.
CVE-2009-1692 impacts Apple iPhone OS versions 1.0 through 2.2.1.
Yes, CVE-2009-1692 can be exploited remotely by attackers through specially crafted web pages.