Twitter Client 2.1.1 on Mac Unicode Tweet denial of service
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.0 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Twitter Client 2.1.1 on Mac. It has been classified as problematic. This vulnerability affects unknown code of the component Unicode Handler. This manipulation of the argument Tweet with the input ????????????????????????????????????????????? ????????????????????????????????????????????? ???????????????????????????????????????????????? as part of Unicode Character causes denial of service.
Moreover, an exploit is present.
It is recommended that the affected component be replaced with an alternative.
Details
A vulnerability was found in Twitter Client 2.1.1 on Mac (Social Network Software). It has been declared as problematic. Affected by this vulnerability is an unknown code block of the component Unicode Handler. The manipulation of the argument Tweet with the input value ????????????????????????????????????????????? ????????????????????????????????????????????? ???????????????????????????????????????????????? leads to a denial of service vulnerability. The CWE definition for the vulnerability is CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. As an impact it is known to affect availability.
The weakness was disclosed 02/17/2013 by Glitchr as 303260914315034624 as not defined tweet (Twitter). It is possible to read the advisory at twitter.com. The vendor was not involved in the public release. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details and also a public exploit are known.
A public exploit has been developed by Glitchr in Unicode String and been published immediately after the advisory. It is possible to download the exploit at twitter.com. It is declared as proof-of-concept.
The problem might be mitigated by replacing the product with as an alternative.
The vulnerability is also documented in the vulnerability database at OSVDB (90311†). Additional details are provided at twitter.com. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Product
Type
Vendor
Name
Version
CPE 2.3
CPE 2.2
Screenshot

CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.0
VulDB Base Score: 5.3
VulDB Temp Score: 5.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: Glitchr
Reliability: 🔍
Programming Language: 🔍
Download: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: AlternativeStatus: 🔍
0-Day Time: 🔍
Exploit Delay Time: 🔍
Timeline
02/17/2013 🔍02/17/2013 🔍
02/19/2013 🔍
05/03/2018 🔍
Sources
Advisory: 303260914315034624Researcher: Glitchr
Status: Not defined
GCVE (VulDB): GCVE-100-7747
OSVDB: 90311
scip Labs: https://www.scip.ch/en/?labs.20161013
Misc.: 🔍
Entry
Created: 02/19/2013 14:35Updated: 05/03/2018 12:26
Changes: 02/19/2013 14:35 (59), 05/03/2018 12:26 (2)
Complete: 🔍
Cache ID: 216:A86:103
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.