CVE-2010-0647

WebKit before r53525, as used in Google Chrome before 4.0.249.89, allows remote attackers to execute arbitrary code in the Chrome sandbox via a malformed RUBY element, as demonstrated by a <ruby>><table><rt> sequence.
References
Link Resource
http://code.google.com/p/chromium/issues/detail?id=31692
http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/38545 Vendor Advisory
http://secunia.com/advisories/41856
http://secunia.com/advisories/43068
http://securitytracker.com/id?1023583
http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs Vendor Advisory
http://trac.webkit.org/changeset/53525
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://www.osvdb.org/62317
http://www.securityfocus.com/bid/38177
http://www.ubuntu.com/usn/USN-1006-1
http://www.vupen.com/english/advisories/2010/0361 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2722
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0552
https://bugs.webkit.org/show_bug.cgi?id=33266
https://exchange.xforce.ibmcloud.com/vulnerabilities/56214
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14094
http://code.google.com/p/chromium/issues/detail?id=31692
http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html Patch
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/38545 Vendor Advisory
http://secunia.com/advisories/41856
http://secunia.com/advisories/43068
http://securitytracker.com/id?1023583
http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs Vendor Advisory
http://trac.webkit.org/changeset/53525
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://www.osvdb.org/62317
http://www.securityfocus.com/bid/38177
http://www.ubuntu.com/usn/USN-1006-1
http://www.vupen.com/english/advisories/2010/0361 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2722
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0552
https://bugs.webkit.org/show_bug.cgi?id=33266
https://exchange.xforce.ibmcloud.com/vulnerabilities/56214
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14094
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*
OR cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.2.149.27:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.48:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.52:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.53:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.59:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:1.0.154.65:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.156.1:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.157.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.157.2:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.158.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.159.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.169.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.169.1:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.170.0:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172.2:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172.8:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172.27:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172.28:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172.30:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172.31:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172.33:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172.37:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:2.0.172.38:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:3.0.182.2:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:3.0.190.2:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:3.0.193.2:beta:*:*:*:*:*:*
cpe:2.3:a:google:chrome:3.0.195.21:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:3.0.195.24:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:3.0.195.32:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:3.0.195.33:*:*:*:*:*:*:*
cpe:2.3:a:google:chrome:4.0.244.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:12

Type Values Removed Values Added
References () http://code.google.com/p/chromium/issues/detail?id=31692 - () http://code.google.com/p/chromium/issues/detail?id=31692 -
References () http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html - Patch () http://googlechromereleases.blogspot.com/2010/02/stable-channel-update.html - Patch
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://secunia.com/advisories/38545 - Vendor Advisory () http://secunia.com/advisories/38545 - Vendor Advisory
References () http://secunia.com/advisories/41856 - () http://secunia.com/advisories/41856 -
References () http://secunia.com/advisories/43068 - () http://secunia.com/advisories/43068 -
References () http://securitytracker.com/id?1023583 - () http://securitytracker.com/id?1023583 -
References () http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs - Vendor Advisory () http://sites.google.com/a/chromium.org/dev/Home/chromium-security/chromium-security-bugs - Vendor Advisory
References () http://trac.webkit.org/changeset/53525 - () http://trac.webkit.org/changeset/53525 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 -
References () http://www.osvdb.org/62317 - () http://www.osvdb.org/62317 -
References () http://www.securityfocus.com/bid/38177 - () http://www.securityfocus.com/bid/38177 -
References () http://www.ubuntu.com/usn/USN-1006-1 - () http://www.ubuntu.com/usn/USN-1006-1 -
References () http://www.vupen.com/english/advisories/2010/0361 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/0361 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2722 - () http://www.vupen.com/english/advisories/2010/2722 -
References () http://www.vupen.com/english/advisories/2011/0212 - () http://www.vupen.com/english/advisories/2011/0212 -
References () http://www.vupen.com/english/advisories/2011/0552 - () http://www.vupen.com/english/advisories/2011/0552 -
References () https://bugs.webkit.org/show_bug.cgi?id=33266 - () https://bugs.webkit.org/show_bug.cgi?id=33266 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/56214 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/56214 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14094 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14094 -

Information

Published : 2010-02-18 18:00

Updated : 2024-11-21 01:12


NVD link : CVE-2010-0647

Mitre link : CVE-2010-0647

CVE.ORG link : CVE-2010-0647


JSON object : View

Products Affected

apple

  • webkit

google

  • chrome
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')