CVE-2005-2516

Safari in Mac OS X 10.3.9 and 10.4.2, when rendering Rich Text Format (RTF) files, can directly access URLs without performing the normal security checks, which allows remote attackers to execute arbitrary commands.
References
Link Resource
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA05-229A.html Patch Third Party Advisory US Government Resource
http://www.kb.cert.org/vuls/id/709220 Patch Third Party Advisory US Government Resource
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*

Information

Published : 2005-08-18 21:00

Updated : 2008-09-05 13:51


NVD link : CVE-2005-2516

Mitre link : CVE-2005-2516


JSON object : View

Advertisement

dedicated server usa

Products Affected

apple

  • mac_os_x
  • safari