First published: Wed Jun 10 2009(Updated: )
The XSL stylesheet implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle XML external entities, which allows remote attackers to read arbitrary files via a crafted DTD, as demonstrated by a file:///etc/passwd URL in an entity declaration, related to an "XXE attack."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | =3.0.4b | |
Apple Safari | =2.0.3-417.9.3 | |
Apple Safari | =3.0.4 | |
Apple Safari | =3.0.1-beta | |
Apple Safari | =2.0.1 | |
Apple Safari | =2.0.3 | |
Apple Safari | =2.0.2 | |
Apple Safari | =3.0.0 | |
Apple Safari | =3.0.1 | |
Apple Safari | =3.0.2 | |
Apple Safari | <=3.2.2 | |
Apple Safari | =3.0.3b | |
Apple Safari | =3.1.1 | |
Apple Safari | =2.0.3-417.9 | |
Apple Safari | =2.0.3-417.9.2 | |
Apple Safari | =3.0.3 | |
Apple Safari | =2.0 | |
Apple Safari | =2.0.3-417.8 | |
Apple Safari | =3.1.2 | |
Apple Safari | =3.1.0b | |
Apple Safari | =3.1.0 | |
Apple Safari | =2.0.4 | |
Apple Safari | =3.0.0b | |
Apple Safari | =2.0.0 | |
Apple Safari | =3.2.0 | |
Apple Safari | =3.0.2b | |
Apple Safari | =3.0.1b | |
Apple Safari | =3.2.1 | |
Apple Safari | =3.0 | |
Apple iPhone OS | =1.0.0 | |
Apple iPhone OS | =1.0.1 | |
Apple iPhone OS | =1.0.2 | |
Apple iPhone OS | =1.1.0 | |
Apple iPhone OS | =1.1.1 | |
Apple iPhone OS | =1.1.2 | |
Apple iPhone OS | =1.1.3 | |
Apple iPhone OS | =1.1.4 | |
Apple iPhone OS | =1.1.5 | |
Apple iPhone OS | =2.0 | |
Apple iPhone OS | =2.0.0 | |
Apple iPhone OS | =2.0.1 | |
Apple iPhone OS | =2.0.2 | |
Apple iPhone OS | =2.1 | |
Apple iPhone OS | =2.1.1 | |
Apple iPhone OS | =2.2 | |
Apple iPhone OS | =2.2.1 | |
Apple iPhone OS | ||
Apple iPod touch | ||
Apple Safari | <4.0 | |
Apple iPhone OS | >=1.0.0<=2.2.1 | |
Canonical Ubuntu Linux | =8.10 | |
Canonical Ubuntu Linux | =9.04 | |
openSUSE openSUSE | =11.2 | |
openSUSE openSUSE | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.