Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:87764
[Eng]
Version
3
Class
vulnerability
ALTXid
258598
Language
Russian
Severity
Critical
Title
openSUSE -- уязвимость в webkit-jsc, libkde4 (CVE-2009-1725)
Description
В продуктах webkit-jsc, libkde4 обнаружена уязвимость CVE-2009-1725.
Family
unix
Platform
openSUSE 11.1
openSUSE 11.2
openSUSE 11.3
Product
libkde4
webkit-jsc
Reference
FSTEC: BDU:2015-04057
FSTEC: BDU:2015-04057
Id:
BDU:2015-04057
Reference:
https://bdu.fstec.ru/vul/2015-04057
FSTEC: BDU:2015-04056
FSTEC: BDU:2015-04056
Id:
BDU:2015-04056
Reference:
https://bdu.fstec.ru/vul/2015-04056
FSTEC: BDU:2015-04055
FSTEC: BDU:2015-04055
Id:
BDU:2015-04055
Reference:
https://bdu.fstec.ru/vul/2015-04055
FSTEC: BDU:2015-04054
FSTEC: BDU:2015-04054
Id:
BDU:2015-04054
Reference:
https://bdu.fstec.ru/vul/2015-04054
FSTEC: BDU:2015-04053
FSTEC: BDU:2015-04053
Id:
BDU:2015-04053
Reference:
https://bdu.fstec.ru/vul/2015-04053
FSTEC: BDU:2015-04052
FSTEC: BDU:2015-04052
Id:
BDU:2015-04052
Reference:
https://bdu.fstec.ru/vul/2015-04052
FSTEC: BDU:2015-04051
FSTEC: BDU:2015-04051
Id:
BDU:2015-04051
Reference:
https://bdu.fstec.ru/vul/2015-04051
FSTEC: BDU:2015-04050
FSTEC: BDU:2015-04050
Id:
BDU:2015-04050
Reference:
https://bdu.fstec.ru/vul/2015-04050
FSTEC: BDU:2015-04049
FSTEC: BDU:2015-04049
Id:
BDU:2015-04049
Reference:
https://bdu.fstec.ru/vul/2015-04049
FSTEC: BDU:2015-04048
FSTEC: BDU:2015-04048
Id:
BDU:2015-04048
Reference:
https://bdu.fstec.ru/vul/2015-04048
FSTEC: BDU:2015-04047
FSTEC: BDU:2015-04047
Id:
BDU:2015-04047
Reference:
https://bdu.fstec.ru/vul/2015-04047
FSTEC: BDU:2015-04046
FSTEC: BDU:2015-04046
Id:
BDU:2015-04046
Reference:
https://bdu.fstec.ru/vul/2015-04046
FSTEC: BDU:2015-04045
FSTEC: BDU:2015-04045
Id:
BDU:2015-04045
Reference:
https://bdu.fstec.ru/vul/2015-04045
FSTEC: BDU:2015-04044
FSTEC: BDU:2015-04044
Id:
BDU:2015-04044
Reference:
https://bdu.fstec.ru/vul/2015-04044
FSTEC: BDU:2015-04043
FSTEC: BDU:2015-04043
Id:
BDU:2015-04043
Reference:
https://bdu.fstec.ru/vul/2015-04043
FSTEC: BDU:2015-04042
FSTEC: BDU:2015-04042
Id:
BDU:2015-04042
Reference:
https://bdu.fstec.ru/vul/2015-04042
FSTEC: BDU:2015-04041
FSTEC: BDU:2015-04041
Id:
BDU:2015-04041
Reference:
https://bdu.fstec.ru/vul/2015-04041
FSTEC: BDU:2015-04040
FSTEC: BDU:2015-04040
Id:
BDU:2015-04040
Reference:
https://bdu.fstec.ru/vul/2015-04040
FSTEC: BDU:2015-04039
FSTEC: BDU:2015-04039
Id:
BDU:2015-04039
Reference:
https://bdu.fstec.ru/vul/2015-04039
FSTEC: BDU:2015-04038
FSTEC: BDU:2015-04038
Id:
BDU:2015-04038
Reference:
https://bdu.fstec.ru/vul/2015-04038
FSTEC: BDU:2015-04037
FSTEC: BDU:2015-04037
Id:
BDU:2015-04037
Reference:
https://bdu.fstec.ru/vul/2015-04037
FSTEC: BDU:2015-04036
FSTEC: BDU:2015-04036
Id:
BDU:2015-04036
Reference:
https://bdu.fstec.ru/vul/2015-04036
FSTEC: BDU:2015-04035
FSTEC: BDU:2015-04035
Id:
BDU:2015-04035
Reference:
https://bdu.fstec.ru/vul/2015-04035
FSTEC: BDU:2015-04034
FSTEC: BDU:2015-04034
Id:
BDU:2015-04034
Reference:
https://bdu.fstec.ru/vul/2015-04034
FSTEC: BDU:2015-02914
FSTEC: BDU:2015-02914
Id:
BDU:2015-02914
Reference:
https://bdu.fstec.ru/vul/2015-02914
FSTEC: BDU:2015-02913
FSTEC: BDU:2015-02913
Id:
BDU:2015-02913
Reference:
https://bdu.fstec.ru/vul/2015-02913
FSTEC: BDU:2015-02912
FSTEC: BDU:2015-02912
Id:
BDU:2015-02912
Reference:
https://bdu.fstec.ru/vul/2015-02912
FSTEC: BDU:2015-02911
FSTEC: BDU:2015-02911
Id:
BDU:2015-02911
Reference:
https://bdu.fstec.ru/vul/2015-02911
FSTEC: BDU:2015-02910
FSTEC: BDU:2015-02910
Id:
BDU:2015-02910
Reference:
https://bdu.fstec.ru/vul/2015-02910
FSTEC: BDU:2015-02909
FSTEC: BDU:2015-02909
Id:
BDU:2015-02909
Reference:
https://bdu.fstec.ru/vul/2015-02909
FSTEC: BDU:2015-02908
FSTEC: BDU:2015-02908
Id:
BDU:2015-02908
Reference:
https://bdu.fstec.ru/vul/2015-02908
FSTEC: BDU:2015-02907
FSTEC: BDU:2015-02907
Id:
BDU:2015-02907
Reference:
https://bdu.fstec.ru/vul/2015-02907
FSTEC: BDU:2015-02905
FSTEC: BDU:2015-02905
Id:
BDU:2015-02905
Reference:
https://bdu.fstec.ru/vul/2015-02905
CVE: CVE-2009-1725
CVE: CVE-2009-1725
Id:
CVE-2009-1725
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1725
Comment
: WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE:
189 (Numeric Errors)
References:
http://support.apple.com/kb/HT3666 (CONFIRM)
APPLE-SA-2009-07-08-1 (APPLE)
35607 (BID)
35758 (SECUNIA)
1022526 (SECTRACK)
55739 (OSVDB)
ADV-2009-1827 (VUPEN)
36062 (SECUNIA)
FEDORA-2009-8046 (FEDORA)
FEDORA-2009-8020 (FEDORA)
FEDORA-2009-8049 (FEDORA)
FEDORA-2009-8039 (FEDORA)
36057 (SECUNIA)
http://websvn.kde.org/?view=rev&revision=1002164 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=513813 (CONFIRM)
http://websvn.kde.org/?view=rev&revision=1002162 (CONFIRM)
FEDORA-2009-8800 (FEDORA)
http://websvn.kde.org/?view=rev&revision=1002163 (CONFIRM)
FEDORA-2009-8802 (FEDORA)
36347 (SECUNIA)
http://support.apple.com/kb/HT3860 (CONFIRM)
36677 (SECUNIA)
APPLE-SA-2009-09-09-1 (APPLE)
DSA-1950 (DEBIAN)
37746 (SECUNIA)
MDVSA-2009:330 (MANDRIVA)
USN-857-1 (UBUNTU)
36790 (SECUNIA)
USN-836-1 (UBUNTU)
SUSE-SR:2011:002 (SUSE)
43068 (SECUNIA)
ADV-2011-0212 (VUPEN)
oval:org.mitre.oval:def:5777 (OVAL)
VENDOR: openSUSE-SU-2011:0024-1
VENDOR: openSUSE-SU-2011:0024-1
Id:
openSUSE-SU-2011:0024-1
Reference:
https://lists.opensuse.org/opensuse-updates/2011-01/msg00013.html
VENDOR: openSUSE-SU-2010:1036-1
VENDOR: openSUSE-SU-2010:1036-1
Id:
openSUSE-SU-2010:1036-1
Reference:
https://lists.opensuse.org/opensuse-updates/2010-12/msg00021.html
Content available only for registered users!
ovaldb@altx-soft.com