Vulnerability Details : CVE-2008-2540
Apple Safari on Mac OS X, and before 3.1.2 on Windows, does not prompt the user before downloading an object that has an unrecognized content type, which allows remote attackers to place malware into the (1) Desktop directory on Windows or (2) Downloads directory on Mac OS X, and subsequently allows remote attackers to execute arbitrary code on Windows by leveraging an untrusted search path vulnerability in (a) Internet Explorer 7 on Windows XP or (b) the SearchPath function in Windows XP, Vista, and Server 2003 and 2008, aka a "Carpet Bomb" and a "Blended Threat Elevation of Privilege Vulnerability," a different issue than CVE-2008-1032. NOTE: Apple considers this a vulnerability only because the Microsoft products can load application libraries from the desktop and, as of 20080619, has not covered the issue in an advisory for Mac OS X.
Vulnerability category: Execute codeGain privilege
Products affected by CVE-2008-2540
- cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*When used together with: Microsoft » Windows Server 2003When used together with: Microsoft » Windows Server 2008
Exploit prediction scoring system (EPSS) score for CVE-2008-2540
42.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-2540
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2008-2540
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-2540
-
http://www.dhanjani.com/archives/2008/05/safari_carpet_bomb.html
Broken Link
-
http://www.securityfocus.com/bid/29445
Third Party Advisory;VDB Entry
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5782
Third Party Advisory
-
http://lists.apple.com/archives/security-announce/2008//Jun/msg00001.html
Mailing List;Vendor Advisory
-
http://www.us-cert.gov/cas/techalerts/TA09-104A.html
Microsoft Updates for Multiple Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
http://securitytracker.com/id?1020150
Third Party Advisory;VDB Entry
-
http://support.avaya.com/elmodocs2/security/ASA-2009-133.htm
ASA-2009-133 (963027)Third Party Advisory
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-015
-
http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=871138
Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6108
Third Party Advisory
-
http://www.vupen.com/english/advisories/2009/1028
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link
-
http://aviv.raffon.net/2008/05/31/SafariPwnsInternetExplorer.aspx
Third Party Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/42765
Third Party Advisory;VDB Entry
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-014
Microsoft Security Bulletin MS09-014 - Critical | Microsoft Learn
-
http://www.vupen.com/english/advisories/2008/1706
Broken Link
-
http://www.vupen.com/english/advisories/2009/1029
Broken Link
-
http://www.microsoft.com/technet/security/advisory/953818.mspx
Mitigation;Patch;Vendor Advisory
-
http://blogs.zdnet.com/security/?p=1230
Third Party Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8509
Third Party Advisory
-
http://www.securitytracker.com/id?1022047
Third Party Advisory;VDB Entry
Jump to