CVE-2008-2309

Severity

68%

Complexity

86%

Confidentiality

106%

Incomplete blacklist vulnerability in CoreTypes in Apple Mac OS X before 10.5.4 allows user-assisted remote attackers to execute arbitrary code via a (1) .xht or (2) .xhtm file, which does not trigger a "potentially unsafe" warning message in (a) the Download Validation feature in Mac OS X 10.4 or (b) the Quarantine feature in Mac OS X 10.5.

Incomplete blacklist vulnerability in CoreTypes in Apple Mac OS X before 10.5.4 allows user-assisted remote attackers to execute arbitrary code via a (1) .xht or (2) .xhtm file, which does not trigger a "potentially unsafe" warning message in (a) the Download Validation feature in Mac OS X 10.4 or (b) the Quarantine feature in Mac OS X 10.5.

CVSS 2.0 Base Score 6.8. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).

Overview

Type

Apple Mac OS X

First reported 16 years ago

2008-07-01 18:41:00

Last updated 7 years ago

2017-08-08 01:30:00

Affected Software

Apple Mac OS X 10.4.1

10.4.1

Apple Mac OS X 10.4.2

10.4.2

Apple Mac OS X 10.4.3

10.4.3

Apple Mac OS X 10.4.4

10.4.4

Apple Mac OS X 10.4.5

10.4.5

Apple Mac OS X 10.4.6

10.4.6

Apple Mac OS X 10.4.7

10.4.7

Apple Mac OS X 10.4.8

10.4.8

Apple Mac OS X 10.4.9

10.4.9

Apple Mac OS X 10.4.10

10.4.10

Apple Mac OS X 10.4.11

10.4.11

Apple Mac OS X 10.5

10.5

Apple Mac OS X 10.5.1

10.5.1

Apple Mac OS X 10.5.2

10.5.2

Apple Mac OS X 10.5.3

10.5.3

Apple Mac OS X Server 10.4.1

10.4.1

Apple Mac OS X Server 10.4.2

10.4.2

Apple Mac OS X Server 10.4.3

10.4.3

Apple Mac OS X Server 10.4.4

10.4.4

Apple Mac OS X Server 10.4.5

10.4.5

Apple Mac OS X Server 10.4.6

10.4.6

Apple Mac OS X Server 10.4.7

10.4.7

Apple Mac OS X Server 10.4.8

10.4.8

Apple Mac OS X Server 10.4.9

10.4.9

Apple Mac OS X Server 10.4.10

10.4.10

Apple Mac OS X Server 10.4.11

10.4.11

Apple Mac OS X Server 10.5

10.5

Apple Mac OS X Server 10.5.1

10.5.1

Apple Mac OS X Server 10.5.2

10.5.2

Apple Mac OS X Server 10.5.3

10.5.3

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.