Vulnerability Details : CVE-2009-0151
The screen saver in Dock in Apple Mac OS X 10.5 before 10.5.8 does not prevent four-finger Multi-Touch gestures, which allows physically proximate attackers to bypass locking and "manage applications or use Expose" via unspecified vectors.
Threat overview for CVE-2009-0151
Top countries where our scanners detected CVE-2009-0151
Top open port discovered on systems with this issue
548
IPs affected by CVE-2009-0151 31
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2009-0151!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2009-0151
Probability of exploitation activity in the next 30 days: 0.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 31 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-0151
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2009-0151
-
http://support.apple.com/kb/HT3757
About the security content of Security Update 2009-003 / Mac OS X v10.5.8 - Apple SupportPatch;Vendor Advisory
-
http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
Patch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2009/2172
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPatch;Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/52421
-
http://www.us-cert.gov/cas/techalerts/TA09-218A.html
Apple Updates for Multiple Vulnerabilities | CISAUS Government Resource
- http://www.securityfocus.com/bid/35954
Products affected by CVE-2009-0151
- cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.5.2:2008-002:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*
- cpe:2.3:a:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*