CVE-2009-1690

N/A Unknown
Published: June 10, 2009 Modified: April 23, 2026
View on NVD

Description

Use-after-free vulnerability in WebKit, as used in Apple Safari before 4.0, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome 1.0.154.53, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by setting an unspecified property of an HTML tag that causes child elements to be freed and later accessed when an HTML error occurs, related to "recursion in certain DOM event handlers."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/54990
Source: cve@mitre.org
http://secunia.com/advisories/35379
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36057
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36062
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/36790
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/37746
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/43068
Source: cve@mitre.org
Vendor Advisory
http://securitytracker.com/id?1022345
Source: cve@mitre.org
Patch
http://support.apple.com/kb/HT3613
Source: cve@mitre.org
Patch Vendor Advisory
http://support.apple.com/kb/HT3639
Source: cve@mitre.org
Patch Vendor Advisory
http://www.securityfocus.com/bid/35260
Source: cve@mitre.org
Exploit Patch
http://www.vupen.com/english/advisories/2009/1522
Source: cve@mitre.org
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1621
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2011/0212
Source: cve@mitre.org
Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://osvdb.org/54990
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35379
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36057
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36062
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/36790
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/37746
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/43068
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1022345
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://support.apple.com/kb/HT3613
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://support.apple.com/kb/HT3639
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2009/dsa-1950
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:330
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35260
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
http://www.ubuntu.com/usn/USN-822-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-836-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-857-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1522
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1621
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2011/0212
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

56 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
8.5%
92th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

google apple