{"vuid":"VU#361043","idnumber":"361043","name":"Apple Safari contains a memory corruption issue in the handling of JavaScript arrays by WebKit","keywords":["Apple","Safari","memory corruption issue","JavaScript arrays","WebKit","unexpected application termination","arbitrary code execution"],"overview":"The Apple Webkit contains a memory corruption vulnerability.This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code.","clean_desc":"According to Apple Security Update 2008-004: A memory corruption issue exists in WebKit's handling of JavaScript arrays. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This vulnerability may affect any software that uses the Apple WebKit, including the Safari web browser. Note that this vulnerability is reported to affect software on both the Windows and Apple OS X operating systems.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code.","resolution":"Apply Apple Updates\nApple has released an update to address this vulnerability. Refer to Apple Security Update 2008-004 for more information.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported in Apple Security Update \n2008-004 Apple credits James Urquhart with reporting this issue.","author":"This document was written by Ryan Giobbi.","public":["http://lists.apple.com/archives/security-announce/2008/Jun/msg00001.html","http://support.apple.com/kb/HT2092","http://support.apple.com/kb/HT2165","http://support.apple.com/kb/HT2163"],"cveids":["CVE-2008-2307"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2008-06-20T13:57:29Z","publicdate":"2008-06-19T00:00:00Z","datefirstpublished":"2008-07-01T22:28:57Z","dateupdated":"2008-07-01T22:29:35Z","revision":6,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"17","cam_easeofexploitation":"9","cam_attackeraccessrequired":"20","cam_scorecurrent":"10.3275","cam_scorecurrentwidelyknown":"13.19625","cam_scorecurrentwidelyknownexploited":"24.67125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.3275,"vulnote":null}