CVE-2010-1417

The Cascading Style Sheets (CSS) implementation in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via HTML content that contains multiple :after pseudo-selectors.
References
Link Resource
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/40105 Vendor Advisory
http://secunia.com/advisories/40196
http://secunia.com/advisories/41856
http://secunia.com/advisories/42314
http://secunia.com/advisories/43068
http://securitytracker.com/id?1024067
http://support.apple.com/kb/HT4196 Vendor Advisory
http://support.apple.com/kb/HT4220
http://support.apple.com/kb/HT4225
http://support.apple.com/kb/HT4456
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://www.securityfocus.com/bid/40620 Patch
http://www.securityfocus.com/bid/40672
http://www.ubuntu.com/usn/USN-1006-1
http://www.vupen.com/english/advisories/2010/1373 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/1512
http://www.vupen.com/english/advisories/2010/2722
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0552
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6876
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html Patch Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/40105 Vendor Advisory
http://secunia.com/advisories/40196
http://secunia.com/advisories/41856
http://secunia.com/advisories/42314
http://secunia.com/advisories/43068
http://securitytracker.com/id?1024067
http://support.apple.com/kb/HT4196 Vendor Advisory
http://support.apple.com/kb/HT4220
http://support.apple.com/kb/HT4225
http://support.apple.com/kb/HT4456
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://www.securityfocus.com/bid/40620 Patch
http://www.securityfocus.com/bid/40672
http://www.ubuntu.com/usn/USN-1006-1
http://www.vupen.com/english/advisories/2010/1373 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/1512
http://www.vupen.com/english/advisories/2010/2722
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0552
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6876
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*

History

21 Nov 2024, 01:14

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html -
References () http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html - () http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html -
References () http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html - Patch, Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - () http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://secunia.com/advisories/40105 - Vendor Advisory () http://secunia.com/advisories/40105 - Vendor Advisory
References () http://secunia.com/advisories/40196 - () http://secunia.com/advisories/40196 -
References () http://secunia.com/advisories/41856 - () http://secunia.com/advisories/41856 -
References () http://secunia.com/advisories/42314 - () http://secunia.com/advisories/42314 -
References () http://secunia.com/advisories/43068 - () http://secunia.com/advisories/43068 -
References () http://securitytracker.com/id?1024067 - () http://securitytracker.com/id?1024067 -
References () http://support.apple.com/kb/HT4196 - Vendor Advisory () http://support.apple.com/kb/HT4196 - Vendor Advisory
References () http://support.apple.com/kb/HT4220 - () http://support.apple.com/kb/HT4220 -
References () http://support.apple.com/kb/HT4225 - () http://support.apple.com/kb/HT4225 -
References () http://support.apple.com/kb/HT4456 - () http://support.apple.com/kb/HT4456 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 -
References () http://www.securityfocus.com/bid/40620 - Patch () http://www.securityfocus.com/bid/40620 - Patch
References () http://www.securityfocus.com/bid/40672 - () http://www.securityfocus.com/bid/40672 -
References () http://www.ubuntu.com/usn/USN-1006-1 - () http://www.ubuntu.com/usn/USN-1006-1 -
References () http://www.vupen.com/english/advisories/2010/1373 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2010/1373 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1512 - () http://www.vupen.com/english/advisories/2010/1512 -
References () http://www.vupen.com/english/advisories/2010/2722 - () http://www.vupen.com/english/advisories/2010/2722 -
References () http://www.vupen.com/english/advisories/2011/0212 - () http://www.vupen.com/english/advisories/2011/0212 -
References () http://www.vupen.com/english/advisories/2011/0552 - () http://www.vupen.com/english/advisories/2011/0552 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6876 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6876 -

Information

Published : 2010-06-11 18:00

Updated : 2024-11-21 01:14


NVD link : CVE-2010-1417

Mitre link : CVE-2010-1417

CVE.ORG link : CVE-2010-1417


JSON object : View

Products Affected

apple

  • mac_os_x
  • webkit
  • safari
  • mac_os_x_server

microsoft

  • windows_vista
  • windows_7
  • windows_xp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer