CVE-2010-3812

Integer overflow in the Text::wholeText method in dom/Text.cpp in WebKit, as used in Apple Safari before 5.0.3 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.3 on Mac OS X 10.4; webkitgtk before 1.2.6; and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving Text objects.
References
Link Resource
http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/42314
http://secunia.com/advisories/43068
http://secunia.com/advisories/43086
http://support.apple.com/kb/HT4455 Patch Vendor Advisory
http://support.apple.com/kb/HT4456
http://trac.webkit.org/changeset/68705
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://www.redhat.com/support/errata/RHSA-2011-0177.html
http://www.securityfocus.com/bid/44960
http://www.vupen.com/english/advisories/2010/3046
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0216
http://www.vupen.com/english/advisories/2011/0552
http://www.zerodayinitiative.com/advisories/ZDI-10-257/
https://bugs.webkit.org/show_bug.cgi?id=46848
https://bugzilla.redhat.com/show_bug.cgi?id=667022
https://exchange.xforce.ibmcloud.com/vulnerabilities/63350
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11689
http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html Vendor Advisory
http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://secunia.com/advisories/42314
http://secunia.com/advisories/43068
http://secunia.com/advisories/43086
http://support.apple.com/kb/HT4455 Patch Vendor Advisory
http://support.apple.com/kb/HT4456
http://trac.webkit.org/changeset/68705
http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
http://www.redhat.com/support/errata/RHSA-2011-0177.html
http://www.securityfocus.com/bid/44960
http://www.vupen.com/english/advisories/2010/3046
http://www.vupen.com/english/advisories/2011/0212
http://www.vupen.com/english/advisories/2011/0216
http://www.vupen.com/english/advisories/2011/0552
http://www.zerodayinitiative.com/advisories/ZDI-10-257/
https://bugs.webkit.org/show_bug.cgi?id=46848
https://bugzilla.redhat.com/show_bug.cgi?id=667022
https://exchange.xforce.ibmcloud.com/vulnerabilities/63350
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11689
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:5.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*
cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.3:417.9.3:*:*:*:*:*:*
cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.1b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.2b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.3b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.0.4b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.0b:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*
OR cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*

History

21 Nov 2024, 01:19

Type Values Removed Values Added
References () http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html - Vendor Advisory () http://lists.apple.com/archives/security-announce/2010//Nov/msg00002.html - Vendor Advisory
References () http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html - () http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html - () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html -
References () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html -
References () http://secunia.com/advisories/42314 - () http://secunia.com/advisories/42314 -
References () http://secunia.com/advisories/43068 - () http://secunia.com/advisories/43068 -
References () http://secunia.com/advisories/43086 - () http://secunia.com/advisories/43086 -
References () http://support.apple.com/kb/HT4455 - Patch, Vendor Advisory () http://support.apple.com/kb/HT4455 - Patch, Vendor Advisory
References () http://support.apple.com/kb/HT4456 - () http://support.apple.com/kb/HT4456 -
References () http://trac.webkit.org/changeset/68705 - () http://trac.webkit.org/changeset/68705 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - () http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 -
References () http://www.redhat.com/support/errata/RHSA-2011-0177.html - () http://www.redhat.com/support/errata/RHSA-2011-0177.html -
References () http://www.securityfocus.com/bid/44960 - () http://www.securityfocus.com/bid/44960 -
References () http://www.vupen.com/english/advisories/2010/3046 - () http://www.vupen.com/english/advisories/2010/3046 -
References () http://www.vupen.com/english/advisories/2011/0212 - () http://www.vupen.com/english/advisories/2011/0212 -
References () http://www.vupen.com/english/advisories/2011/0216 - () http://www.vupen.com/english/advisories/2011/0216 -
References () http://www.vupen.com/english/advisories/2011/0552 - () http://www.vupen.com/english/advisories/2011/0552 -
References () http://www.zerodayinitiative.com/advisories/ZDI-10-257/ - () http://www.zerodayinitiative.com/advisories/ZDI-10-257/ -
References () https://bugs.webkit.org/show_bug.cgi?id=46848 - () https://bugs.webkit.org/show_bug.cgi?id=46848 -
References () https://bugzilla.redhat.com/show_bug.cgi?id=667022 - () https://bugzilla.redhat.com/show_bug.cgi?id=667022 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/63350 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/63350 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11689 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11689 -

Information

Published : 2010-11-22 13:00

Updated : 2024-11-21 01:19


NVD link : CVE-2010-3812

Mitre link : CVE-2010-3812

CVE.ORG link : CVE-2010-3812


JSON object : View

Products Affected

apple

  • mac_os_x_server
  • mac_os_x
  • safari
  • webkit

microsoft

  • windows_xp
  • windows_vista
  • windows_7
CWE
CWE-189

Numeric Errors