National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2008-2540 Detail

Current Description

Apple Safari on Mac OS X, and before 3.1.2 on Windows, does not prompt the user before downloading an object that has an unrecognized content type, which allows remote attackers to place malware into the (1) Desktop directory on Windows or (2) Downloads directory on Mac OS X, and subsequently allows remote attackers to execute arbitrary code on Windows by leveraging an untrusted search path vulnerability in (a) Internet Explorer 7 on Windows XP or (b) the SearchPath function in Windows XP, Vista, and Server 2003 and 2008, aka a "Carpet Bomb" and a "Blended Threat Elevation of Privilege Vulnerability," a different issue than CVE-2008-1032. NOTE: Apple considers this a vulnerability only because the Microsoft products can load application libraries from the desktop and, as of 20080619, has not covered the issue in an advisory for Mac OS X.

Source:  MITRE      Last Modified:  06/03/2008      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2008-2540
Original release date:
06/03/2008
Last revised:
11/22/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
9.3 HIGH
Vector:
(AV:N/AC:M/Au:N/C:C/I:C/A:C) (legend)
Impact Subscore:
10.0
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Provides administrator access, Allows complete confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx Third Party Advisory External Source MISC http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx
http://blogs.zdnet.com/security/?p=1230 Third Party Advisory External Source MISC http://blogs.zdnet.com/security/?p=1230
http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html Mailing List; Vendor Advisory External Source APPLE APPLE-SA-2008-06-19
http://securitytracker.com/id?1020150 Third Party Advisory; VDB Entry External Source SECTRACK 1020150
http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm Third Party Advisory External Source CONFIRM http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=871138 Third Party Advisory External Source CONFIRM http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=871138
http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html Broken Link External Source MISC http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html
http://www.microsoft.com/technet/security/advisory/953818.mspx Mitigation; Patch; Vendor Advisory External Source MISC http://www.microsoft.com/technet/security/advisory/953818.mspx
http://www.microsoft.com/technet/security/Bulletin/MS09-014.mspx Mitigation; Patch; Vendor Advisory External Source MS MS09-014
http://www.microsoft.com/technet/security/bulletin/ms09-015.mspx Mitigation; Patch; Vendor Advisory External Source MS MS09-015
http://www.securityfocus.com/bid/29445 Third Party Advisory; VDB Entry External Source BID 29445
http://www.securitytracker.com/id?1022047 Third Party Advisory; VDB Entry External Source SECTRACK 1022047
http://www.us-cert.gov/cas/techalerts/TA09-104A.html Third Party Advisory; US Government Resource External Source CERT TA09-104A
http://www.vupen.com/english/advisories/2008/1706 Broken Link External Source VUPEN ADV-2008-1706
http://www.vupen.com/english/advisories/2009/1028 Broken Link External Source VUPEN ADV-2009-1028
http://www.vupen.com/english/advisories/2009/1029 Broken Link External Source VUPEN ADV-2009-1029
https://exchange.xforce.ibmcloud.com/vulnerabilities/42765 Third Party Advisory; VDB Entry External Source XF apple-safari-windows-code-execution(42765)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5782 Third Party Advisory External Source OVAL oval:org.mitre.oval:def:5782
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6108 Third Party Advisory External Source OVAL oval:org.mitre.oval:def:6108
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8509 Third Party Advisory External Source OVAL oval:org.mitre.oval:def:8509

References to Check Content

Identifier:
oval:org.mitre.oval:def:5782
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:5782
Identifier:
oval:org.mitre.oval:def:6108
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:6108
Identifier:
oval:org.mitre.oval:def:8509
Check System:
http://oval.mitre.org/XMLSchema/oval-definitions-5
Hyperlink:
http://oval.mitre.org/repository/data/DownloadDefinition?id=oval:org.mitre.oval:def:8509

Technical Details

Vulnerability Type (View All)

  • Permissions, Privileges, and Access Control (CWE-264)

Change History 10 change records found - show changes