CVE-2010-1749

Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to the Cascading Style Sheets (CSS) run-in property and multiple invocations of a destructor for a child element that has been referenced multiple times.
References
Link Resource
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/40105 Vendor Advisory
http://secunia.com/advisories/40196 Vendor Advisory
http://secunia.com/advisories/43068 Vendor Advisory
http://securitytracker.com/id?1024067
http://support.apple.com/kb/HT4196 Vendor Advisory
http://support.apple.com/kb/HT4220 Vendor Advisory
http://www.securityfocus.com/archive/1/511725/100/0/threaded
http://www.securityfocus.com/bid/40620 Patch
http://www.vupen.com/english/advisories/2010/1373 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/1512 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0212 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-10-101
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7180
http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/40105 Vendor Advisory
http://secunia.com/advisories/40196 Vendor Advisory
http://secunia.com/advisories/43068 Vendor Advisory
http://securitytracker.com/id?1024067
http://support.apple.com/kb/HT4196 Vendor Advisory
http://support.apple.com/kb/HT4220 Vendor Advisory
http://www.securityfocus.com/archive/1/511725/100/0/threaded
http://www.securityfocus.com/bid/40620 Patch
http://www.vupen.com/english/advisories/2010/1373 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/1512 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0212 Vendor Advisory
http://www.zerodayinitiative.com/advisories/ZDI-10-101
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7180
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*

History

21 Nov 2024, 01:15

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html - Patch, Vendor Advisory () http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html - Patch, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://secunia.com/advisories/40105 - Vendor Advisory () http://secunia.com/advisories/40105 - Vendor Advisory
References () http://secunia.com/advisories/40196 - Vendor Advisory () http://secunia.com/advisories/40196 - Vendor Advisory
References () http://secunia.com/advisories/43068 - Vendor Advisory () http://secunia.com/advisories/43068 - Vendor Advisory
References () http://securitytracker.com/id?1024067 - () http://securitytracker.com/id?1024067 -
References () http://support.apple.com/kb/HT4196 - Vendor Advisory () http://support.apple.com/kb/HT4196 - Vendor Advisory
References () http://support.apple.com/kb/HT4220 - Vendor Advisory () http://support.apple.com/kb/HT4220 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/511725/100/0/threaded - () http://www.securityfocus.com/archive/1/511725/100/0/threaded -
References () http://www.securityfocus.com/bid/40620 - Patch () http://www.securityfocus.com/bid/40620 - Patch
References () http://www.vupen.com/english/advisories/2010/1373 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2010/1373 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1512 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1512 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2011/0212 - Vendor Advisory () http://www.vupen.com/english/advisories/2011/0212 - Vendor Advisory
References () http://www.zerodayinitiative.com/advisories/ZDI-10-101 - () http://www.zerodayinitiative.com/advisories/ZDI-10-101 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7180 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7180 -

Information

Published : 2010-06-11 18:00

Updated : 2024-11-21 01:15


NVD link : CVE-2010-1749

Mitre link : CVE-2010-1749

CVE.ORG link : CVE-2010-1749


JSON object : View

Products Affected

microsoft

  • windows_xp
  • windows_vista
  • windows_7

apple

  • mac_os_x_server
  • mac_os_x
  • webkit
  • safari
CWE
CWE-399

Resource Management Errors