CVE-2010-1119

Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Safari before 4.1 on Mac OS X 10.4, and Safari on Apple iPhone OS allows remote attackers to execute arbitrary code or cause a denial of service (application crash), or read the SMS database or other data, via vectors related to "attribute manipulation," as demonstrated by Vincenzo Iozzo and Ralf Philipp Weinmann during a Pwn2Own competition at CanSecWest 2010.
References
Link Resource
http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html Vendor Advisory
http://news.cnet.com/8301-27080_3-20001126-245.html
http://secunia.com/advisories/40105 Vendor Advisory
http://secunia.com/advisories/40196 Vendor Advisory
http://securityreason.com/securityalert/8128
http://securitytracker.com/id?1024067
http://support.apple.com/kb/HT4196 Vendor Advisory
http://support.apple.com/kb/HT4220 Vendor Advisory
http://support.apple.com/kb/HT4225 Vendor Advisory
http://twitter.com/thezdi/statuses/11001080021
http://www.securityfocus.com/bid/40620
http://www.vupen.com/english/advisories/2010/1373 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1512 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7037
http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html Vendor Advisory
http://news.cnet.com/8301-27080_3-20001126-245.html
http://secunia.com/advisories/40105 Vendor Advisory
http://secunia.com/advisories/40196 Vendor Advisory
http://securityreason.com/securityalert/8128
http://securitytracker.com/id?1024067
http://support.apple.com/kb/HT4196 Vendor Advisory
http://support.apple.com/kb/HT4220 Vendor Advisory
http://support.apple.com/kb/HT4225 Vendor Advisory
http://twitter.com/thezdi/statuses/11001080021
http://www.securityfocus.com/bid/40620
http://www.vupen.com/english/advisories/2010/1373 Vendor Advisory
http://www.vupen.com/english/advisories/2010/1512 Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7037
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:beta:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*

History

21 Nov 2024, 01:13

Type Values Removed Values Added
References () http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010 - () http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010 -
References () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - Vendor Advisory
References () http://news.cnet.com/8301-27080_3-20001126-245.html - () http://news.cnet.com/8301-27080_3-20001126-245.html -
References () http://secunia.com/advisories/40105 - Vendor Advisory () http://secunia.com/advisories/40105 - Vendor Advisory
References () http://secunia.com/advisories/40196 - Vendor Advisory () http://secunia.com/advisories/40196 - Vendor Advisory
References () http://securityreason.com/securityalert/8128 - () http://securityreason.com/securityalert/8128 -
References () http://securitytracker.com/id?1024067 - () http://securitytracker.com/id?1024067 -
References () http://support.apple.com/kb/HT4196 - Vendor Advisory () http://support.apple.com/kb/HT4196 - Vendor Advisory
References () http://support.apple.com/kb/HT4220 - Vendor Advisory () http://support.apple.com/kb/HT4220 - Vendor Advisory
References () http://support.apple.com/kb/HT4225 - Vendor Advisory () http://support.apple.com/kb/HT4225 - Vendor Advisory
References () http://twitter.com/thezdi/statuses/11001080021 - () http://twitter.com/thezdi/statuses/11001080021 -
References () http://www.securityfocus.com/bid/40620 - () http://www.securityfocus.com/bid/40620 -
References () http://www.vupen.com/english/advisories/2010/1373 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1373 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1512 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1512 - Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7037 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7037 -

Information

Published : 2010-03-25 21:00

Updated : 2024-11-21 01:13


NVD link : CVE-2010-1119

Mitre link : CVE-2010-1119

CVE.ORG link : CVE-2010-1119


JSON object : View

Products Affected

apple

  • iphone_os
  • mac_os_x_server
  • mac_os_x
  • safari

microsoft

  • windows
CWE
CWE-399

Resource Management Errors