CVE-2008-2540
Apple Safari on Mac OS X, and before 3.1.2 on Windows, does not prompt the user before downloading an object that has an unrecognized content type, which allows remote attackers to place malware into the (1) Desktop directory on Windows or (2) Downloads directory on Mac OS X, and subsequently allows remote attackers to execute arbitrary code on Windows by leveraging an untrusted search path vulnerability in (a) Internet Explorer 7 on Windows XP or (b) the SearchPath function in Windows XP, Vista, and Server 2003 and 2008, aka a "Carpet Bomb" and a "Blended Threat Elevation of Privilege Vulnerability," a different issue than CVE-2008-1032. NOTE: Apple considers this a vulnerability only because the Microsoft products can load application libraries from the desktop and, as of 20080619, has not covered the issue in an advisory for Mac OS X.
Published
2008-06-03T15:32:00.000
Last Modified
2025-04-09T00:30:58.490
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 9.3 (HIGH)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: COMPLETE
- Integrity Impact: COMPLETE
- Availability Impact: COMPLETE
Exploitability Score
8.6
Impact Score
10.0
Weaknesses
Affected Vendors & Products
References
-
http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx
Third Party Advisory
([email protected])
-
http://blogs.zdnet.com/security/?p=1230
Third Party Advisory
([email protected])
-
http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html
Mailing List, Vendor Advisory
([email protected])
-
http://secunia.com/advisories/30467
Third Party Advisory
([email protected])
-
http://securitytracker.com/id?1020150
Third Party Advisory, VDB Entry
([email protected])
-
http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm
Third Party Advisory
([email protected])
-
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=871138
Third Party Advisory
([email protected])
-
http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html
Broken Link
([email protected])
-
http://www.microsoft.com/technet/security/advisory/953818.mspx
Mitigation, Patch, Vendor Advisory
([email protected])
-
http://www.securityfocus.com/bid/29445
Third Party Advisory, VDB Entry
([email protected])
-
http://www.securitytracker.com/id?1022047
Third Party Advisory, VDB Entry
([email protected])
-
http://www.us-cert.gov/cas/techalerts/TA09-104A.html
Third Party Advisory, US Government Resource
([email protected])
-
http://www.vupen.com/english/advisories/2008/1706
Broken Link
([email protected])
-
http://www.vupen.com/english/advisories/2009/1028
Broken Link
([email protected])
-
http://www.vupen.com/english/advisories/2009/1029
Broken Link
([email protected])
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014
([email protected])
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-015
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/42765
Third Party Advisory, VDB Entry
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5782
Third Party Advisory
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6108
Third Party Advisory
([email protected])
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8509
Third Party Advisory
([email protected])
-
http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://blogs.zdnet.com/security/?p=1230
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html
Mailing List, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/30467
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securitytracker.com/id?1020150
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=871138
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.microsoft.com/technet/security/advisory/953818.mspx
Mitigation, Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/29445
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securitytracker.com/id?1022047
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.us-cert.gov/cas/techalerts/TA09-104A.html
Third Party Advisory, US Government Resource
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2008/1706
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2009/1028
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.vupen.com/english/advisories/2009/1029
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014
(af854a3a-2127-422b-91ae-364da2661108)
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-015
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/42765
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5782
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6108
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8509
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)