The XSLT implementation in WebKit in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, and iPhone OS for iPod touch 1.1 through 2.2.1 does not properly handle redirects, which allows remote attackers to read XML content from arbitrary web pages via a crafted document.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://support.apple.com/kb/HT3639 | |
http://secunia.com/advisories/43068 | third party advisory |
http://www.vupen.com/english/advisories/2009/1621 | vdb entry |
http://www.vupen.com/english/advisories/2011/0212 | vdb entry |
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html | patch vendor advisory |
http://www.securityfocus.com/bid/35260 | vdb entry exploit |
http://www.vupen.com/english/advisories/2009/1522 | vdb entry patch vendor advisory |
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html | vendor advisory |
http://osvdb.org/54973 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | vendor advisory |
http://secunia.com/advisories/35379 | third party advisory vendor advisory |
http://support.apple.com/kb/HT3613 | patch vendor advisory |