CVE-2010-1387

Use-after-free vulnerability in JavaScriptCore in WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page transitions, a different vulnerability than CVE-2010-1763 and CVE-2010-1769.
References
Link Resource
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/40196 Vendor Advisory
http://secunia.com/advisories/41856 Vendor Advisory
http://secunia.com/advisories/42314 Vendor Advisory
http://secunia.com/advisories/43068 Vendor Advisory
http://securitytracker.com/id?1024108
http://support.apple.com/kb/HT4220 Vendor Advisory
http://support.apple.com/kb/HT4225 Vendor Advisory
http://support.apple.com/kb/HT4456 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://www.securityfocus.com/bid/41016
http://www.ubuntu.com/usn/USN-1006-1
http://www.vupen.com/english/advisories/2010/1512 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2722 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0212 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0552 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/59506
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7061
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/40196 Vendor Advisory
http://secunia.com/advisories/41856 Vendor Advisory
http://secunia.com/advisories/42314 Vendor Advisory
http://secunia.com/advisories/43068 Vendor Advisory
http://securitytracker.com/id?1024108
http://support.apple.com/kb/HT4220 Vendor Advisory
http://support.apple.com/kb/HT4225 Vendor Advisory
http://support.apple.com/kb/HT4456 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://www.securityfocus.com/bid/41016
http://www.ubuntu.com/usn/USN-1006-1
http://www.vupen.com/english/advisories/2010/1512 Vendor Advisory
http://www.vupen.com/english/advisories/2010/2722 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0212 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0552 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/59506
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7061
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*
OR cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:14

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html - Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://secunia.com/advisories/40196 - Vendor Advisory () http://secunia.com/advisories/40196 - Vendor Advisory
References () http://secunia.com/advisories/41856 - Vendor Advisory () http://secunia.com/advisories/41856 - Vendor Advisory
References () http://secunia.com/advisories/42314 - Vendor Advisory () http://secunia.com/advisories/42314 - Vendor Advisory
References () http://secunia.com/advisories/43068 - Vendor Advisory () http://secunia.com/advisories/43068 - Vendor Advisory
References () http://securitytracker.com/id?1024108 - () http://securitytracker.com/id?1024108 -
References () http://support.apple.com/kb/HT4220 - Vendor Advisory () http://support.apple.com/kb/HT4220 - Vendor Advisory
References () http://support.apple.com/kb/HT4225 - Vendor Advisory () http://support.apple.com/kb/HT4225 - Vendor Advisory
References () http://support.apple.com/kb/HT4456 - Vendor Advisory () http://support.apple.com/kb/HT4456 - Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 -
References () http://www.securityfocus.com/bid/41016 - () http://www.securityfocus.com/bid/41016 -
References () http://www.ubuntu.com/usn/USN-1006-1 - () http://www.ubuntu.com/usn/USN-1006-1 -
References () http://www.vupen.com/english/advisories/2010/1512 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1512 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/2722 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/2722 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0212 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0212 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0552 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0552 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/59506 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/59506 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7061 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7061 -

Information

Published : 2010-06-18 16:30

Updated : 2024-11-21 01:14


NVD link : CVE-2010-1387

Mitre link : CVE-2010-1387

CVE.ORG link : CVE-2010-1387


JSON object : View

Products Affected

apple

  • iphone_os
  • ipod_touch
  • itunes

microsoft

  • windows
CWE
CWE-399

Resource Management Errors