CFNetwork in Apple iOS before 5.0.1 and Mac OS X 10.7 before 10.7.2 does not properly parse URLs, which allows remote attackers to trigger visits to unintended web sites, and transmission of cookies to unintended web sites, via a crafted (1) http or (2) https URL.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://support.apple.com/kb/HT5130 | |
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html | vendor advisory |
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html | vendor advisory |
http://lists.apple.com/archives/Security-announce/2011/Nov/msg00001.html | vendor advisory |
http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.html | vendor advisory |
http://support.apple.com/kb/HT5052 | |
http://support.apple.com/kb/HT4999 | vendor advisory |
http://www.securityfocus.com/bid/50115 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/70551 | vdb entry |
http://support.apple.com/kb/HT5002 | vendor advisory |
http://www.securityfocus.com/bid/50085 | vdb entry |