CVE-2005-4504 (CNNVD-200512-545)

HIGH 有利用代码
中文标题:
Apple Mac OS X KHTML解析器远程拒绝服务漏洞
英文标题:
The khtml::RenderTableSection::ensureRows function in KHTMLParser in Apple Mac OS X 10.4.3 and earli...
CVSS分数: 7.8
发布时间: 2005-12-22 23:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v4
漏洞描述
中文描述:

Apple Mac OS X是苹果家族电脑所使用的操作系统。 Mac OS X的KHTML解析器中存在拒绝服务漏洞。 在运行特制的.html文件时,khtml::RenderTableSection::ensureRows没有正确的解析数据,导致崩溃。KTHML解析器试图将内部数组的大小调整为rowspan值所显示的单元数。如果这个值很大的话,就无法调整数组,应用程序就会终止。 下面显示的是gdb中OS X 10.4.3上使用Safari所触发的崩溃: Program received signal SIGABRT, Aborted. 0x9004716c in kill () (gdb) bt #0 0x9004716c in kill () #1 0x90128b98 in abort () #2 0x95dcd974 in khtml::sYSMALLOc () <(=-- Is called because of sYSMALLOc(1234567890) #3 0x95dce1a4 in khtml::main_thread_realloc () #4 0x95bc0d64 in KWQArrayImpl::resize () #5 0x95c05428 in khtml::RenderTableSection::ensureRows () #6 0x95c0784c in khtml::RenderTableSection::addCell () #7 0x95c076ac in khtml::RenderTableRow::addChild () #8 0x95bcb2d8 in DOM::NodeImpl::createRendererIfNeeded () #9 0x95bcb1c4 in DOM::ElementImpl::attach () #10 0x95bca254 in KHTMLParser::insertNode () #11 0x95bcadd8 in KHTMLParser::insertNode () #12 0x95bcadd8 in KHTMLParser::insertNode () #13 0x95bc83fc in KHTMLParser::parseToken () #14 0x95bc54a4 in khtml::HTMLTokenizer::processToken () #15 0x95bc6e08 in khtml::HTMLTokenizer::parseTag () #16 0x95bc4d24 in khtml::HTMLTokenizer::write () #17 0x95bc038c in KHTMLPart::write () #18 0x959b510c in -[WebDataSource(WebPrivate) _commitLoadWithData:] () #19 0x9598165c in -[WebMainResourceClient addData:] () #20 0x95981588 in -[WebBaseResourceHandleDelegate didReceiveData:lengthReceived:] () #21 0x959db930 in -[WebMainResourceClient didReceiveData:lengthReceived:] () #22 0x95981524 in -[WebBaseResourceHandleDelegate connection:didReceiveData:lengthReceived:] () #23 0x92910a64 in -[NSURLConnection(NSURLConnectionInternal) _sendDidReceiveDataCallback] () #24 0x9290ef04 in -[NSURLConnection(NSURLConnectionInternal) _sendCallbacks] () #25 0x9290eca0 in _sendCallbacks () #26 0x9075db20 in __CFRunLoopDoSources0 () #27 0x9075cf98 in __CFRunLoopRun () #28 0x9075ca18 in CFRunLoopRunSpecific () #29 0x931861e0 in RunCurrentEventLoopInMode () #30 0x931857ec in ReceiveNextEventCommon () #31 0x931856e0 in BlockUntilNextEventMatchingListInMode () #32 0x93683904 in _DPSNextEvent () #33 0x936835c8 in -[NSApplication nextEventMatchingMask:untilDate:inMode:dequeue:] () #34 0x00007910 in ?? () #35 0x9367fb0c in -[NSApplication run] () #36 0x93770618 in NSApplicationMain () #37 0x0000307c in ?? () #38 0x00057758 in ?? ()

英文描述:

The khtml::RenderTableSection::ensureRows function in KHTMLParser in Apple Mac OS X 10.4.3 and earlier, as used by Safari and TextEdit, allows remote attackers to cause a denial of service (memory consumption and application crash) via HTML files with a large ROWSPAN attribute in a TD tag.

CWE类型:
(暂无数据)
标签:
dos osx Tom Ferris OSVDB-22037
受影响产品
厂商 产品 版本 版本范围 平台 CPE
apple safari 1.0 - - cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*
apple safari 1.1 - - cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*
apple safari 1.2 - - cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*
apple safari 1.2.1 - - cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*
apple safari 1.2.2 - - cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*
apple safari 1.2.3 - - cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*
apple safari 1.3 - - cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*
apple safari 2.0 - - cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
apple safari 2.0.1 - - cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
apple safari 2.0.2 - - cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
apple textedit * - - cpe:2.3:a:apple:textedit:*:*:*:*:*:*:*:*
apple mac_os_x 10.0 - - cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*
apple mac_os_x 10.0.1 - - cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*
apple mac_os_x 10.0.2 - - cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*
apple mac_os_x 10.0.3 - - cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*
apple mac_os_x 10.0.4 - - cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*
apple mac_os_x 10.1 - - cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*
apple mac_os_x 10.1.1 - - cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*
apple mac_os_x 10.1.2 - - cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*
apple mac_os_x 10.1.3 - - cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*
apple mac_os_x 10.1.4 - - cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*
apple mac_os_x 10.1.5 - - cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*
apple mac_os_x 10.2 - - cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
apple mac_os_x 10.2.1 - - cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
apple mac_os_x 10.2.2 - - cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
apple mac_os_x 10.2.3 - - cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
apple mac_os_x 10.2.4 - - cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
apple mac_os_x 10.2.5 - - cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
apple mac_os_x 10.2.6 - - cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
apple mac_os_x 10.2.7 - - cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*
apple mac_os_x 10.2.8 - - cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*
apple mac_os_x 10.3 - - cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*
apple mac_os_x 10.3.1 - - cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*
apple mac_os_x 10.3.2 - - cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*
apple mac_os_x 10.3.3 - - cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*
apple mac_os_x 10.3.4 - - cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*
apple mac_os_x 10.3.5 - - cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*
apple mac_os_x 10.3.6 - - cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*
apple mac_os_x 10.3.7 - - cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*
apple mac_os_x 10.3.8 - - cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*
apple mac_os_x 10.3.9 - - cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*
apple mac_os_x 10.4 - - cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
apple mac_os_x 10.4.1 - - cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
apple mac_os_x 10.4.2 - - cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
apple mac_os_x 10.4.3 - - cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
apple mac_os_x_server 10.0 - - cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*
apple mac_os_x_server 10.1 - - cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*
apple mac_os_x_server 10.1.1 - - cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*
apple mac_os_x_server 10.1.2 - - cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*
apple mac_os_x_server 10.1.3 - - cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*
apple mac_os_x_server 10.1.4 - - cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*
apple mac_os_x_server 10.1.5 - - cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*
apple mac_os_x_server 10.2 - - cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*
apple mac_os_x_server 10.2.1 - - cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*
apple mac_os_x_server 10.2.2 - - cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*
apple mac_os_x_server 10.2.3 - - cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*
apple mac_os_x_server 10.2.4 - - cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*
apple mac_os_x_server 10.2.5 - - cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*
apple mac_os_x_server 10.2.6 - - cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*
apple mac_os_x_server 10.2.7 - - cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*
apple mac_os_x_server 10.2.8 - - cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*
apple mac_os_x_server 10.3 - - cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.1 - - cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.2 - - cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.3 - - cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.4 - - cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.5 - - cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.6 - - cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.7 - - cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.8 - - cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*
apple mac_os_x_server 10.3.9 - - cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*
apple mac_os_x_server 10.4 - - cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
apple mac_os_x_server 10.4.1 - - cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
apple mac_os_x_server 10.4.2 - - cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
apple mac_os_x_server 10.4.3 - - cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
18220 third-party-advisory
cve.org
访问
macos-khtmlparser-dos(23819) vdb-entry
cve.org
访问
ADV-2005-3058 vdb-entry
cve.org
访问
19064 third-party-advisory
cve.org
访问
16907 vdb-entry
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
ADV-2006-0791 vdb-entry
cve.org
访问
16045 vdb-entry
cve.org
访问
APPLE-SA-2006-03-01 vendor-advisory
cve.org
访问
VU#351217 third-party-advisory
cve.org
访问
TA06-062A third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
ExploitDB EDB-26971 EXPLOIT
exploitdb
访问
Download Exploit EDB-26971 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2005-4504 ADVISORY
cve.org
访问
CVSS评分详情
7.8
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS版本: 2.0
机密性
NONE
完整性
NONE
可用性
COMPLETE
时间信息
发布时间:
2005-12-22 23:00:00
修改时间:
2024-08-07 23:46:05
创建时间:
2025-11-11 15:32:30
更新时间:
2025-11-11 16:23:20
利用信息
此漏洞有可利用代码!
利用代码数量: 1
利用来源:
未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2005-4504 2025-11-11 15:17:38 2025-11-11 07:32:30
NVD nvd_CVE-2005-4504 2025-11-11 14:51:21 2025-11-11 07:41:16
CNNVD cnnvd_CNNVD-200512-545 2025-11-11 15:08:48 2025-11-11 07:49:03
EXPLOITDB exploitdb_EDB-26971 2025-11-11 15:05:29 2025-11-11 08:23:20
版本与语言
当前版本: v4
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
安全公告
暂无安全公告信息
变更历史
v4 EXPLOITDB
2025-11-11 16:23:20
references_count: 13 → 16; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 13 -> 16
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:49:03
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200512-545; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200512-545
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:16
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.8; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:N/I:N/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 75; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.8
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:N/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 75
  • data_sources: ['cve'] -> ['cve', 'nvd']