CVE-2010-4577

The CSSParser::parseFontFaceSrc function in WebCore/css/CSSParser.cpp in WebKit, as used in Google Chrome before 8.0.552.224, Chrome OS before 8.0.552.343, webkitgtk before 1.2.6, and other products does not properly parse Cascading Style Sheets (CSS) token sequences, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted local font, related to "Type Confusion."
References
Link Resource
http://code.google.com/p/chromium/issues/detail?id=63866 Exploit Issue Tracking Mailing List
http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html Release Notes
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html Mailing List Third Party Advisory
http://secunia.com/advisories/42648 Broken Link Third Party Advisory
http://secunia.com/advisories/43086 Broken Link Third Party Advisory
http://trac.webkit.org/changeset/72685 Mailing List Patch
http://trac.webkit.org/changeset/72685/trunk/WebCore/css/CSSParser.cpp Mailing List Patch
http://www.debian.org/security/2011/dsa-2188 Mailing List Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-201012-01.xml Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0177.html Broken Link Third Party Advisory
http://www.securityfocus.com/bid/45722 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0216 Broken Link Third Party Advisory
https://bugs.webkit.org/show_bug.cgi?id=49883 Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=667025 Issue Tracking Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13953 Broken Link Third Party Advisory
http://code.google.com/p/chromium/issues/detail?id=63866 Exploit Issue Tracking Mailing List
http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html Release Notes
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html Mailing List Third Party Advisory
http://secunia.com/advisories/42648 Broken Link Third Party Advisory
http://secunia.com/advisories/43086 Broken Link Third Party Advisory
http://trac.webkit.org/changeset/72685 Mailing List Patch
http://trac.webkit.org/changeset/72685/trunk/WebCore/css/CSSParser.cpp Mailing List Patch
http://www.debian.org/security/2011/dsa-2188 Mailing List Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-201012-01.xml Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2011-0177.html Broken Link Third Party Advisory
http://www.securityfocus.com/bid/45722 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2011/0216 Broken Link Third Party Advisory
https://bugs.webkit.org/show_bug.cgi?id=49883 Permissions Required
https://bugzilla.redhat.com/show_bug.cgi?id=667025 Issue Tracking Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13953 Broken Link Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*
cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:21

Type Values Removed Values Added
References () http://code.google.com/p/chromium/issues/detail?id=63866 - Exploit, Issue Tracking, Mailing List () http://code.google.com/p/chromium/issues/detail?id=63866 - Exploit, Issue Tracking, Mailing List
References () http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html - Release Notes () http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html - Release Notes
References () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html - Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html - Mailing List, Third Party Advisory
References () http://secunia.com/advisories/42648 - Broken Link, Third Party Advisory () http://secunia.com/advisories/42648 - Broken Link, Third Party Advisory
References () http://secunia.com/advisories/43086 - Broken Link, Third Party Advisory () http://secunia.com/advisories/43086 - Broken Link, Third Party Advisory
References () http://trac.webkit.org/changeset/72685 - Mailing List, Patch () http://trac.webkit.org/changeset/72685 - Mailing List, Patch
References () http://trac.webkit.org/changeset/72685/trunk/WebCore/css/CSSParser.cpp - Mailing List, Patch () http://trac.webkit.org/changeset/72685/trunk/WebCore/css/CSSParser.cpp - Mailing List, Patch
References () http://www.debian.org/security/2011/dsa-2188 - Mailing List, Third Party Advisory () http://www.debian.org/security/2011/dsa-2188 - Mailing List, Third Party Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-201012-01.xml - Third Party Advisory () http://www.gentoo.org/security/en/glsa/glsa-201012-01.xml - Third Party Advisory
References () http://www.redhat.com/support/errata/RHSA-2011-0177.html - Broken Link, Third Party Advisory () http://www.redhat.com/support/errata/RHSA-2011-0177.html - Broken Link, Third Party Advisory
References () http://www.securityfocus.com/bid/45722 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/45722 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2011/0216 - Broken Link, Third Party Advisory () http://www.vupen.com/english/advisories/2011/0216 - Broken Link, Third Party Advisory
References () https://bugs.webkit.org/show_bug.cgi?id=49883 - Permissions Required () https://bugs.webkit.org/show_bug.cgi?id=49883 - Permissions Required
References () https://bugzilla.redhat.com/show_bug.cgi?id=667025 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=667025 - Issue Tracking, Third Party Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13953 - Broken Link, Third Party Advisory () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13953 - Broken Link, Third Party Advisory

02 Feb 2024, 02:39

Type Values Removed Values Added
References (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13953 - Third Party Advisory (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13953 - Broken Link, Third Party Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2011/0216 - Third Party Advisory (VUPEN) http://www.vupen.com/english/advisories/2011/0216 - Broken Link, Third Party Advisory
References (MISC) http://trac.webkit.org/changeset/72685/trunk/WebCore/css/CSSParser.cpp - Patch, Third Party Advisory (MISC) http://trac.webkit.org/changeset/72685/trunk/WebCore/css/CSSParser.cpp - Mailing List, Patch
References (CONFIRM) http://code.google.com/p/chromium/issues/detail?id=63866 - Exploit, Patch, Vendor Advisory (CONFIRM) http://code.google.com/p/chromium/issues/detail?id=63866 - Exploit, Issue Tracking, Mailing List
References (BID) http://www.securityfocus.com/bid/45722 - Third Party Advisory, VDB Entry (BID) http://www.securityfocus.com/bid/45722 - Broken Link, Third Party Advisory, VDB Entry
References (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html - Third Party Advisory (FEDORA) http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052906.html - Mailing List, Third Party Advisory
References (MISC) http://trac.webkit.org/changeset/72685 - Patch, Third Party Advisory (MISC) http://trac.webkit.org/changeset/72685 - Mailing List, Patch
References (DEBIAN) http://www.debian.org/security/2011/dsa-2188 - Third Party Advisory (DEBIAN) http://www.debian.org/security/2011/dsa-2188 - Mailing List, Third Party Advisory
References (CONFIRM) http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html - Vendor Advisory (CONFIRM) http://googlechromereleases.blogspot.com/2010/12/stable-beta-channel-updates_13.html - Release Notes
References (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0177.html - Third Party Advisory (REDHAT) http://www.redhat.com/support/errata/RHSA-2011-0177.html - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/43086 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/43086 - Broken Link, Third Party Advisory
References (SECUNIA) http://secunia.com/advisories/42648 - Third Party Advisory (SECUNIA) http://secunia.com/advisories/42648 - Broken Link, Third Party Advisory
CVSS v2 : 5.0
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-843

Information

Published : 2010-12-22 01:00

Updated : 2024-11-21 01:21


NVD link : CVE-2010-4577

Mitre link : CVE-2010-4577

CVE.ORG link : CVE-2010-4577


JSON object : View

Products Affected

webkitgtk

  • webkitgtk

google

  • chrome
  • chrome_os

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-125

Out-of-bounds Read

CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')