[Japanese]

JVNDB-2007-000727

Safari allows access from HTTP to HTTPS

Overview

Apple Safari contains a vulnerability that allows a remote attacker to access HTTPS content via an HTTP session.

Safari is a default web browser installed in Mac OS X and iPhone.
Safari contains a vulnerability that allows a remote attacker to access web page contents protected by SSL/TLS from an HTTP page in the same domain.
CVSS Severity (What is CVSS?)

CVSS V2 Severity:
Base Metrics 4.0 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: High
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: None
Affected Products


Apple Inc.
  • Safari 3.0.3 and earlier for Mac OS X, Windows XP / Vista
  • Apple Mac OS X v10.4 - v10.4.10
  • iPhone v1.1.1 before

Impact

A remote attacker could obtain or change the web page contents protected by SSL/TLS from an HTTP page in the same domain.
Solution

[Update the Software]

Apply the latest updates provided by the vendor.

For more information, refer to the vendor's website.
Vendor Information

Apple Inc.
CWE (What is CWE?)

  1. Improper Input Validation(CWE-20) [NVD Evaluation]
CVE (What is CVE?)

  1. CVE-2007-4671
References

  1. JVN : JVN#79013771
  2. National Vulnerability Database (NVD) : CVE-2007-4671
  3. Secunia Advisory : SA26983
  4. SecurityFocus : 25852
  5. ISS X-Force Database : 36862
  6. SecurityTracker : 1018752
  7. FrSIRT Advisories : FrSIRT/ADV-2007-3287
Revision History

  • [2008/05/21]
      Web page published