var-201003-1084
Vulnerability from variot
Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Safari before 4.1 on Mac OS X 10.4, and Safari on Apple iPhone OS allows remote attackers to execute arbitrary code or cause a denial of service (application crash), or read the SMS database or other data, via vectors related to "attribute manipulation," as demonstrated by Vincenzo Iozzo and Ralf Philipp Weinmann during a Pwn2Own competition at CanSecWest 2010. This vulnerability allows remote attackers to execute remote code on vulnerable installations of Apple Webkit. User interaction is required in that a target must be coerced into visiting a malicious page.The specific flaw exists within Webkit's process for destructing attribute objects via the removeChild method. If an attribute's child object is accessed after the attribute was removed from the document, an invalid pointer is referenced. This can be exploited by an attacker to execute remote code under the context of the user running the browser. Safari is prone to multiple security vulnerabilities that have been addressed in Apple security advisory APPLE-SA-2010-06-07-1. Attackers can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage. Successful attacks may result in information-disclosure, remote code-execution, denial-of-service, or other consequences. This BID is being retired. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. ----------------------------------------------------------------------
Secunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management
Free webinars
http://secunia.com/vulnerability_scanning/corporate/webinars/
TITLE: Apple Safari Multiple Vulnerabilities
SECUNIA ADVISORY ID: SA40105
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40105/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40105
RELEASE DATE: 2010-06-09
DISCUSS ADVISORY: http://secunia.com/advisories/40105/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/40105/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=40105
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct spoofing or cross-site scripting attacks, and potentially compromise a user's system.
1) An error when processing ColorSync profiles embedded in a specially crafted image can be exploited to potentially execute arbitrary code.
This is related to vulnerability #2 in: SA36096
2) The browser follows links containing arbitrary user information without warning, which can be exploited to facilitate phishing attacks via specially crafted URLs.
4) An error in WebKit when handling clipboard URLs can be exploited to disclose sensitive files if a user is tricked into dragging or pasting links or images to a malicious website.
5) An error in WebKit when a selection from a website is dragged or pasted into another website can be exploited to potentially execute arbitrary JavaScript code in the context of the destination website.
6) An error in WebKit when handling UTF-7 encoded text can be exploited to leave an HTML quoted string unterminated and facilitate cross-site scripting attacks.
7) An input sanitation error in WebKit when handling Local Storage and Web SQL databases can be exploited to create database files in arbitrary directories via directory traversal attacks.
10) An error in WebKit when handling HTML document fragments can be exploited to execute arbitrary JavaScript code in a legitimate context processing foreign HTML fragments.
11) An error in WebKit when handling keyboard focus can be exploited to deliver key press events intended for a different frame.
12) An error in WebKit when handling DOM constructor objects can be exploited to conduct cross-site scripting attacks.
13) A use-after-free error in WebKit when handling the removal of container elements can be exploited to potentially execute arbitrary code.
14) A use-after-free error in WebKit when rendering a selection at the time of a layout change can be exploited to potentially execute arbitrary code.
15) An error in WebKit when handling ordered list insertions can be exploited to corrupt memory and potentially execute arbitrary code.
16) An uninitialised memory access error in WebKit when handling selection changes on form input elements can be exploited to potentially execute arbitrary code.
18) A use-after-free error in WebKit when handling the ":first-letter" pseudo-element in cascading stylesheets can be exploited to potentially execute arbitrary code.
19) A double-free error in WebKit when handling event listeners in SVG documents can be exploited to potentially execute arbitrary code.
20) An uninitialised memory access error in WebKit when handling "use" elements in SVG documents can be exploited to potentially execute arbitrary code.
21) A use-after-free error in WebKit when handling SVG documents with multiple "use" elements can be exploited to potentially execute arbitrary code.
22) An error in WebKit when handling nested "use" elements in SVG documents can be exploited to corrupt memory and potentially execute arbitrary code.
24) A use-after-free error in WebKit when handling HTML elements with custom vertical positioning can be exploited to potentially execute arbitrary code.
25) An error exists in WebKit when visiting HTTPS websites redirecting to HTTP websites. This can be exploited to disclose potentially sensitive information contained in the HTTPS URL by reading the "Referer" header.
26) An integer truncation error in WebKit when handling TCP requests can be exploited to pass arbitrary data to arbitrary TCP ports.
27) An error in WebKit when processing connections to IRC ports can be exploited to send arbitrary data to arbitrary IRC servers.
29) An error in WebKit can be exploited to read NTLM credentials that are incorrectly transmitted in plain-text via Man-in-the-Middle (MitM) attacks.
32) An error in WebKit when handling a canvas with an SVG image pattern can be exploited to load and capture an image from another website.
33) An error in WebKit when rendering CSS-styled HTML content with multiple ":after" pseudo-selectors can be exploited to corrupt memory and potentially execute arbitrary code.
34) An error in WebKit when handling the "src" attribute of a frame element can be exploited to facilitate cross-site scripting attacks.
36) An error in the implementation of the JavaScript "execCommand" function can be exploited to modify the contents of the clipboard.
38) A use-after-free error in WebKit when handling DOM "Range" objects can be exploited to potentially execute arbitrary code.
40) A use-after-free error in WebKit when rendering HTML document subtrees can be exploited to potentially execute arbitrary code.
41) An error in WebKit when handling HTML content in "textarea" elements can be exploited to conduct cross-site scripting attacks.
42) An error in WebKit when visiting a website which redirects form submissions to a redirecting website can be exploited disclose submitted data.
43) A type checking error in WebKit when handling text nodes can be exploited to potentially execute arbitrary code.
45) An error in WebKit when handling HTML tables can be exploited to trigger an out-of-bounds memory access and potentially execute arbitrary code.
46) An error in WebKit when handling the CSS ":visited" pseudo-class can be exploited to disclose visited websites.
SOLUTION: Update to version 4.1 (available only for Mac OS X v10.4 systems) or upgrade to version 5.0.
PROVIDED AND/OR DISCOVERED BY: 37) Michal Zalewski
The vendor also credits: 1) Chris Evans of the Google Security Team, and Andrzej Dyjak 2) Abhishek Arya of Google 3) Borja Marcos of Sarenet 4) Eric Seidel of Google 5) Paul Stone of Context Information Security 6) Masahiro Yamada 8) Matthieu Bonetti of Vupen 9) Ralf Philipp Weinmann working with TippingPoint's Zero Day Initiative 10, 41) Eduardo Vela Nava (sirdarckcat) of Google 11) Michal Zalewski of Google 12) Gianni "gf3" Chiappetta of Runlevel6 13, 15, 16, 18, 19, 20, 21, 23, 43) wushi of team509, working with TippingPoint's Zero Day Initiative 14) wushi and Z of team509, working with TippingPoint's Zero Day Initiative 17) regenrecht working with iDefense 22, 31) Aki Helin of OUSPG 24) Ojan Vafai of Google 25) Colin Percival of Tarsnap 28) Dave Bowker 30) Mark Dowd of Azimuth Security 32) Chris Evans of Google 33, 45) wushi of team509 34) Sergey Glazunov 35) kuzzcc, and Skylined of Google Chrome Security Team 38) Yaar Schnitman of Google 39) Mark Dowd 40) James Robinson of Google 42) Marc Worrell of WhatWebWhat
ORIGINAL ADVISORY: Apple: http://support.apple.com/kb/HT4196
Michal Zalewski: http://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. Some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or compromise a user's system.
For more information: SA37931 SA40105
4) One unspecified vulnerability with an unknown impact has been reported in WebKit included in iTunes. No further information is currently available.
5) Two vulnerabilities in WebKit can be exploited by malicious people to compromise a user's system.
For more information see vulnerability #14 and 15 in: SA40257
SOLUTION: Update to version 9.2.
PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Chris Evans of the Google Security Team and Andrzej Dyjak. 2) The vendor credits Kevin Finisterre, digitalmunition.com. 4) Reported by the vendor. ZDI-10-091: Apple Webkit Attribute Child Removal Remote Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-10-091 June 8, 2010
-- CVE ID: CVE-2010-1119
-- Affected Vendors: Apple
-- Affected Products: Apple WebKit
-- TippingPoint(TM) IPS Customer Protection: TippingPoint IPS customers have been protected against this vulnerability by Digital Vaccine protection filter ID 9853.
-- Vendor Response: Apple has issued an update to correct this vulnerability. More details can be found at:
http://support.apple.com/kb/HT4196
-- Disclosure Timeline: 2010-03-26 - Vulnerability reported to vendor 2010-06-08 - Coordinated public release of advisory
-- Credit: This vulnerability was discovered by: * Ralf Philipp Weinmann and Vincenzo Iozzo * Vincenzo Iozzo
-- About the Zero Day Initiative (ZDI): Established by TippingPoint, The Zero Day Initiative (ZDI) represents a best-of-breed model for rewarding security researchers for responsibly disclosing discovered vulnerabilities.
Researchers interested in getting paid for their security research through the ZDI can find more information and sign-up at:
http://www.zerodayinitiative.com
The ZDI is unique in how the acquired vulnerability information is used. TippingPoint does not re-sell the vulnerability details or any exploit code. Instead, upon notifying the affected product vendor, TippingPoint provides its customers with zero day protection through its intrusion prevention technology. Explicit details regarding the specifics of the vulnerability are not exposed to any parties until an official vendor patch is publicly available. Furthermore, with the altruistic aim of helping to secure a broader user base, TippingPoint provides this vulnerability information confidentially to security vendors (including competitors) who have a vulnerability protection or mitigation product.
Our vulnerability disclosure policy is available online at:
http://www.zerodayinitiative.com/advisories/disclosure_policy/
Follow the ZDI on Twitter:
http://twitter.com/thezdi
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201003-1084", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.0.4" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.0.3" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0.1b" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "4.1" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0.3" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0.3b" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0.2b" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "1.1.0" }, { "model": "safari", "scope": "eq", "trust": 1.6, "vendor": "apple", "version": "3.0.0b" }, { "model": "safari", "scope": "eq", "trust": 1.4, "vendor": "apple", "version": "4" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.6.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.4" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.1.1" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.2" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.0" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.6.3" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.3" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.3" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.3" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.0b" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.4" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.2" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.3" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.3" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.6.0" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.8" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.4" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.0b2" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.0" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.5" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.5" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.1.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.3" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.4" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.6" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.1.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.0" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.6.0" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.8" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0.4b" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.4" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.3.2" }, { "model": "safari", "scope": "lte", "trust": 1.0, "vendor": "apple", "version": "4.0.5" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.0.3" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.5" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.6.4" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "4.0.0b" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.6.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.7" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.0b1" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.6" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.1" }, { "model": "iphone os", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "2.2.1" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.2" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.2.0" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "1.0.1" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.7" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3.2.1" }, { "model": "mac os x", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5" }, { "model": "safari", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "3" }, { "model": "mac os x server", "scope": "eq", "trust": 1.0, "vendor": "apple", "version": "10.5.1" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.11" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.4.11" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "ios", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "2.0 to 3.1.3" }, { "model": "ios for ipod touch", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "2.1 to 3.1.3" }, { "model": "iphone", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "ipod touch", "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": "itunes", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "9" }, { "model": "safari", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "5" }, { "model": "webkit", "scope": null, "trust": 0.7, "vendor": "apple", "version": null }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.0.5" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.0.4" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.0.3" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4.0.2" }, { "model": "safari for windows", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4" }, { "model": "safari beta", "scope": "eq", "trust": 0.6, "vendor": "apple", "version": "4" }, { "model": "safari for windows", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "5.0" }, { "model": "safari", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "5.0" }, { "model": "safari", "scope": "ne", "trust": 0.6, "vendor": "apple", "version": "4.1" }, { "model": "open source project webkit r52833", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r52401", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r51295", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit r38566", "scope": null, "trust": 0.3, "vendor": "webkit", "version": null }, { "model": "open source project webkit", "scope": "eq", "trust": 0.3, "vendor": "webkit", "version": "0" }, { "model": "handset alliance android", "scope": "eq", "trust": 0.3, "vendor": "open", "version": "2.0.1" }, { "model": "handset alliance android", "scope": "eq", "trust": 0.3, "vendor": "open", "version": "2.1.1" }, { "model": "handset alliance android", "scope": "eq", "trust": 0.3, "vendor": "open", "version": "2.1" }, { "model": "handset alliance android", "scope": "eq", "trust": 0.3, "vendor": "open", "version": "2.0" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0.2" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0.1.8" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0.1" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.0" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "9.1" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.2" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.1" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0.2.20" }, { "model": "itunes", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "8.0" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "ipod touch", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "3.0" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.2" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.1" }, { "model": "iphone", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "2.0" }, { "model": "itunes", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "9.2" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "apple", "version": "4" } ], "sources": [ { "db": "ZDI", "id": "ZDI-10-091" }, { "db": "BID", "id": "40642" }, { "db": "BID", "id": "40620" }, { "db": "JVNDB", "id": "JVNDB-2010-001548" }, { "db": "CNNVD", "id": "CNNVD-201003-384" }, { "db": "NVD", "id": "CVE-2010-1119" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:apple:mac_os_x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:mac_os_x_server", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:iphone_os", "vulnerable": true }, { "cpe22Uri": "cpe:/o:apple:iphone_os_for_ipod_touch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:iphone", "vulnerable": true }, { "cpe22Uri": "cpe:/h:apple:ipod_touch", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:itunes", "vulnerable": true }, { "cpe22Uri": "cpe:/a:apple:safari", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001548" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ralf Philipp WeinmannVincenzo Iozzo", "sources": [ { "db": "ZDI", "id": "ZDI-10-091" } ], "trust": 0.7 }, "cve": "CVE-2010-1119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2010-1119", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.7, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2010-1119", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-43724", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2010-1119", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2010-1119", "trust": 0.8, "value": "Medium" }, { "author": "ZDI", "id": "CVE-2010-1119", "trust": 0.7, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201003-384", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-43724", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "ZDI", "id": "ZDI-10-091" }, { "db": "VULHUB", "id": "VHN-43724" }, { "db": "JVNDB", "id": "JVNDB-2010-001548" }, { "db": "CNNVD", "id": "CNNVD-201003-384" }, { "db": "NVD", "id": "CVE-2010-1119" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Safari before 4.1 on Mac OS X 10.4, and Safari on Apple iPhone OS allows remote attackers to execute arbitrary code or cause a denial of service (application crash), or read the SMS database or other data, via vectors related to \"attribute manipulation,\" as demonstrated by Vincenzo Iozzo and Ralf Philipp Weinmann during a Pwn2Own competition at CanSecWest 2010. This vulnerability allows remote attackers to execute remote code on vulnerable installations of Apple Webkit. User interaction is required in that a target must be coerced into visiting a malicious page.The specific flaw exists within Webkit\u0027s process for destructing attribute objects via the removeChild method. If an attribute\u0027s child object is accessed after the attribute was removed from the document, an invalid pointer is referenced. This can be exploited by an attacker to execute remote code under the context of the user running the browser. Safari is prone to multiple security vulnerabilities that have been addressed in Apple security advisory APPLE-SA-2010-06-07-1. \nAttackers can exploit these issues by enticing an unsuspecting user into visiting a malicious webpage. Successful attacks may result in information-disclosure, remote code-execution, denial-of-service, or other consequences. \nThis BID is being retired. WebKit is a set of open source web browser engines jointly developed by companies such as KDE, Apple (Apple), and Google (Google), and is currently used by browsers such as Apple Safari and Google Chrome. ----------------------------------------------------------------------\n\n\nSecunia CSI integrated with Microsoft WSUS and Microsoft SCCM for 3rd party Patch Management\n\nFree webinars\n\nhttp://secunia.com/vulnerability_scanning/corporate/webinars/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nApple Safari Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA40105\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/40105/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40105\n\nRELEASE DATE:\n2010-06-09\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/40105/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/40105/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40105\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in Apple Safari, which can be\nexploited by malicious people to bypass certain security restrictions,\ndisclose sensitive information, conduct spoofing or cross-site\nscripting attacks, and potentially compromise a user\u0027s system. \n\n1) An error when processing ColorSync profiles embedded in a\nspecially crafted image can be exploited to potentially execute\narbitrary code. \n\nThis is related to vulnerability #2 in:\nSA36096\n\n2) The browser follows links containing arbitrary user information\nwithout warning, which can be exploited to facilitate phishing\nattacks via specially crafted URLs. \n\n4) An error in WebKit when handling clipboard URLs can be exploited\nto disclose sensitive files if a user is tricked into dragging or\npasting links or images to a malicious website. \n\n5) An error in WebKit when a selection from a website is dragged or\npasted into another website can be exploited to potentially execute\narbitrary JavaScript code in the context of the destination website. \n\n6) An error in WebKit when handling UTF-7 encoded text can be\nexploited to leave an HTML quoted string unterminated and facilitate\ncross-site scripting attacks. \n\n7) An input sanitation error in WebKit when handling Local Storage\nand Web SQL databases can be exploited to create database files in\narbitrary directories via directory traversal attacks. \n\n10) An error in WebKit when handling HTML document fragments can be\nexploited to execute arbitrary JavaScript code in a legitimate\ncontext processing foreign HTML fragments. \n\n11) An error in WebKit when handling keyboard focus can be exploited\nto deliver key press events intended for a different frame. \n\n12) An error in WebKit when handling DOM constructor objects can be\nexploited to conduct cross-site scripting attacks. \n\n13) A use-after-free error in WebKit when handling the removal of\ncontainer elements can be exploited to potentially execute arbitrary\ncode. \n\n14) A use-after-free error in WebKit when rendering a selection at\nthe time of a layout change can be exploited to potentially execute\narbitrary code. \n\n15) An error in WebKit when handling ordered list insertions can be\nexploited to corrupt memory and potentially execute arbitrary code. \n\n16) An uninitialised memory access error in WebKit when handling\nselection changes on form input elements can be exploited to\npotentially execute arbitrary code. \n\n18) A use-after-free error in WebKit when handling the\n\":first-letter\" pseudo-element in cascading stylesheets can be\nexploited to potentially execute arbitrary code. \n\n19) A double-free error in WebKit when handling event listeners in\nSVG documents can be exploited to potentially execute arbitrary\ncode. \n\n20) An uninitialised memory access error in WebKit when handling\n\"use\" elements in SVG documents can be exploited to potentially\nexecute arbitrary code. \n\n21) A use-after-free error in WebKit when handling SVG documents with\nmultiple \"use\" elements can be exploited to potentially execute\narbitrary code. \n\n22) An error in WebKit when handling nested \"use\" elements in SVG\ndocuments can be exploited to corrupt memory and potentially execute\narbitrary code. \n\n24) A use-after-free error in WebKit when handling HTML elements with\ncustom vertical positioning can be exploited to potentially execute\narbitrary code. \n\n25) An error exists in WebKit when visiting HTTPS websites\nredirecting to HTTP websites. This can be exploited to disclose\npotentially sensitive information contained in the HTTPS URL by\nreading the \"Referer\" header. \n\n26) An integer truncation error in WebKit when handling TCP requests\ncan be exploited to pass arbitrary data to arbitrary TCP ports. \n\n27) An error in WebKit when processing connections to IRC ports can\nbe exploited to send arbitrary data to arbitrary IRC servers. \n\n29) An error in WebKit can be exploited to read NTLM credentials that\nare incorrectly transmitted in plain-text via Man-in-the-Middle (MitM)\nattacks. \n\n32) An error in WebKit when handling a canvas with an SVG image\npattern can be exploited to load and capture an image from another\nwebsite. \n\n33) An error in WebKit when rendering CSS-styled HTML content with\nmultiple \":after\" pseudo-selectors can be exploited to corrupt memory\nand potentially execute arbitrary code. \n\n34) An error in WebKit when handling the \"src\" attribute of a frame\nelement can be exploited to facilitate cross-site scripting attacks. \n\n36) An error in the implementation of the JavaScript \"execCommand\"\nfunction can be exploited to modify the contents of the clipboard. \n\n38) A use-after-free error in WebKit when handling DOM \"Range\"\nobjects can be exploited to potentially execute arbitrary code. \n\n40) A use-after-free error in WebKit when rendering HTML document\nsubtrees can be exploited to potentially execute arbitrary code. \n\n41) An error in WebKit when handling HTML content in \"textarea\"\nelements can be exploited to conduct cross-site scripting attacks. \n\n42) An error in WebKit when visiting a website which redirects form\nsubmissions to a redirecting website can be exploited disclose\nsubmitted data. \n\n43) A type checking error in WebKit when handling text nodes can be\nexploited to potentially execute arbitrary code. \n\n45) An error in WebKit when handling HTML tables can be exploited to\ntrigger an out-of-bounds memory access and potentially execute\narbitrary code. \n\n46) An error in WebKit when handling the CSS \":visited\" pseudo-class\ncan be exploited to disclose visited websites. \n\nSOLUTION:\nUpdate to version 4.1 (available only for Mac OS X v10.4 systems) or\nupgrade to version 5.0. \n\nPROVIDED AND/OR DISCOVERED BY:\n37) Michal Zalewski\n\nThe vendor also credits:\n1) Chris Evans of the Google Security Team, and Andrzej Dyjak\n2) Abhishek Arya of Google\n3) Borja Marcos of Sarenet\n4) Eric Seidel of Google\n5) Paul Stone of Context Information Security\n6) Masahiro Yamada\n8) Matthieu Bonetti of Vupen\n9) Ralf Philipp Weinmann working with TippingPoint\u0027s Zero Day\nInitiative\n10, 41) Eduardo Vela Nava (sirdarckcat) of Google\n11) Michal Zalewski of Google\n12) Gianni \"gf3\" Chiappetta of Runlevel6\n13, 15, 16, 18, 19, 20, 21, 23, 43) wushi of team509, working with\nTippingPoint\u0027s Zero Day Initiative\n14) wushi and Z of team509, working with TippingPoint\u0027s Zero Day\nInitiative\n17) regenrecht working with iDefense\n22, 31) Aki Helin of OUSPG\n24) Ojan Vafai of Google\n25) Colin Percival of Tarsnap\n28) Dave Bowker\n30) Mark Dowd of Azimuth Security\n32) Chris Evans of Google\n33, 45) wushi of team509\n34) Sergey Glazunov\n35) kuzzcc, and Skylined of Google Chrome Security Team\n38) Yaar Schnitman of Google\n39) Mark Dowd\n40) James Robinson of Google\n42) Marc Worrell of WhatWebWhat\n\nORIGINAL ADVISORY:\nApple:\nhttp://support.apple.com/kb/HT4196\n\nMichal Zalewski:\nhttp://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. Some\nhave an unknown impact and others can be exploited by malicious\npeople to bypass certain security restrictions, disclose sensitive\ninformation, or compromise a user\u0027s system. \n\nFor more information:\nSA37931\nSA40105\n\n4) One unspecified vulnerability with an unknown impact has been\nreported in WebKit included in iTunes. No further information is\ncurrently available. \n\n5) Two vulnerabilities in WebKit can be exploited by malicious people\nto compromise a user\u0027s system. \n\nFor more information see vulnerability #14 and 15 in:\nSA40257\n\nSOLUTION:\nUpdate to version 9.2. \n\nPROVIDED AND/OR DISCOVERED BY:\n1) The vendor credits Chris Evans of the Google Security Team and\nAndrzej Dyjak. \n2) The vendor credits Kevin Finisterre, digitalmunition.com. \n4) Reported by the vendor. ZDI-10-091: Apple Webkit Attribute Child Removal Remote Code Execution Vulnerability\nhttp://www.zerodayinitiative.com/advisories/ZDI-10-091\nJune 8, 2010\n\n-- CVE ID:\nCVE-2010-1119\n\n-- Affected Vendors:\nApple\n\n-- Affected Products:\nApple WebKit\n\n-- TippingPoint(TM) IPS Customer Protection:\nTippingPoint IPS customers have been protected against this\nvulnerability by Digital Vaccine protection filter ID 9853. \n\n-- Vendor Response:\nApple has issued an update to correct this vulnerability. More\ndetails can be found at:\n\nhttp://support.apple.com/kb/HT4196\n\n-- Disclosure Timeline:\n2010-03-26 - Vulnerability reported to vendor\n2010-06-08 - Coordinated public release of advisory\n\n-- Credit:\nThis vulnerability was discovered by:\n * Ralf Philipp Weinmann and Vincenzo Iozzo\n * Vincenzo Iozzo\n\n-- About the Zero Day Initiative (ZDI):\nEstablished by TippingPoint, The Zero Day Initiative (ZDI) represents \na best-of-breed model for rewarding security researchers for responsibly\ndisclosing discovered vulnerabilities. \n\nResearchers interested in getting paid for their security research\nthrough the ZDI can find more information and sign-up at:\n\n http://www.zerodayinitiative.com\n\nThe ZDI is unique in how the acquired vulnerability information is\nused. TippingPoint does not re-sell the vulnerability details or any\nexploit code. Instead, upon notifying the affected product vendor,\nTippingPoint provides its customers with zero day protection through\nits intrusion prevention technology. Explicit details regarding the\nspecifics of the vulnerability are not exposed to any parties until\nan official vendor patch is publicly available. Furthermore, with the\naltruistic aim of helping to secure a broader user base, TippingPoint\nprovides this vulnerability information confidentially to security\nvendors (including competitors) who have a vulnerability protection or\nmitigation product. \n\nOur vulnerability disclosure policy is available online at:\n\n http://www.zerodayinitiative.com/advisories/disclosure_policy/\n\nFollow the ZDI on Twitter:\n\n http://twitter.com/thezdi", "sources": [ { "db": "NVD", "id": "CVE-2010-1119" }, { "db": "JVNDB", "id": "JVNDB-2010-001548" }, { "db": "ZDI", "id": "ZDI-10-091" }, { "db": "BID", "id": "40642" }, { "db": "BID", "id": "40620" }, { "db": "VULHUB", "id": "VHN-43724" }, { "db": "PACKETSTORM", "id": "90456" }, { "db": "PACKETSTORM", "id": "91028" }, { "db": "PACKETSTORM", "id": "90403" } ], "trust": 3.15 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-43724", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-43724" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-1119", "trust": 3.6 }, { "db": "SECUNIA", "id": "40105", "trust": 2.0 }, { "db": "VUPEN", "id": "ADV-2010-1512", "trust": 1.9 }, { "db": "VUPEN", "id": "ADV-2010-1373", "trust": 1.9 }, { "db": "SECTRACK", "id": "1024067", "trust": 1.9 }, { "db": "BID", "id": "40620", "trust": 1.4 }, { "db": "SECUNIA", "id": "40196", "trust": 1.2 }, { "db": "ZDI", "id": "ZDI-10-091", "trust": 1.1 }, { "db": "SREASON", "id": "8128", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2010-001548", "trust": 0.8 }, { "db": "ZDI_CAN", "id": "ZDI-CAN-762", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-201003-384", "trust": 0.6 }, { "db": "BID", "id": "40642", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "90403", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "99300", "trust": 0.1 }, { "db": "SEEBUG", "id": "SSVID-71462", "trust": 0.1 }, { "db": "EXPLOIT-DB", "id": "16974", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-43724", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "90456", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "91028", "trust": 0.1 } ], "sources": [ { "db": "ZDI", "id": "ZDI-10-091" }, { "db": "VULHUB", "id": "VHN-43724" }, { "db": "BID", "id": "40642" }, { "db": "BID", "id": "40620" }, { "db": "JVNDB", "id": "JVNDB-2010-001548" }, { "db": "PACKETSTORM", "id": "90456" }, { "db": "PACKETSTORM", "id": "91028" }, { "db": "PACKETSTORM", "id": "90403" }, { "db": "CNNVD", "id": "CNNVD-201003-384" }, { "db": "NVD", "id": "CVE-2010-1119" } ] }, "id": "VAR-201003-1084", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-43724" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T20:11:22.051000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT4196", "trust": 1.5, "url": "http://support.apple.com/kb/HT4196" }, { "title": "HT4220", "trust": 0.8, "url": "http://support.apple.com/kb/HT4220" }, { "title": "HT4225", "trust": 0.8, "url": "http://support.apple.com/kb/HT4225" }, { "title": "HT4196", "trust": 0.8, "url": "http://support.apple.com/kb/HT4196?viewlocale=ja_JP" }, { "title": "HT4220", "trust": 0.8, "url": "http://support.apple.com/kb/HT4220?viewlocale=ja_JP" }, { "title": "HT4225", "trust": 0.8, "url": "http://support.apple.com/kb/HT4225?viewlocale=ja_JP" } ], "sources": [ { "db": "ZDI", "id": "ZDI-10-091" }, { "db": "JVNDB", "id": "JVNDB-2010-001548" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-43724" }, { "db": "NVD", "id": "CVE-2010-1119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://support.apple.com/kb/ht4196" }, { "trust": 1.9, "url": "http://securitytracker.com/id?1024067" }, { "trust": 1.9, "url": "http://secunia.com/advisories/40105" }, { "trust": 1.9, "url": "http://www.vupen.com/english/advisories/2010/1373" }, { "trust": 1.9, "url": "http://www.vupen.com/english/advisories/2010/1512" }, { "trust": 1.7, "url": "http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010" }, { "trust": 1.7, "url": "http://news.cnet.com/8301-27080_3-20001126-245.html" }, { "trust": 1.7, "url": "http://twitter.com/thezdi/statuses/11001080021" }, { "trust": 1.2, "url": "http://support.apple.com/kb/ht4220" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2010/jun/msg00000.html" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2010//jun/msg00002.html" }, { "trust": 1.1, "url": "http://lists.apple.com/archives/security-announce/2010/jun/msg00003.html" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/40620" }, { "trust": 1.1, "url": "http://support.apple.com/kb/ht4225" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a7037" }, { "trust": 1.1, "url": "http://secunia.com/advisories/40196" }, { "trust": 1.1, "url": "http://securityreason.com/securityalert/8128" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1119" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-1119" }, { "trust": 0.4, "url": "http://lcamtuf.blogspot.com/2010/06/safari-tale-of-betrayal-and-revenge.html" }, { "trust": 0.3, "url": "http://www.apple.com/safari/download/" }, { "trust": 0.3, "url": "/archive/1/511715" }, { "trust": 0.3, "url": "http://www.zerodayinitiative.com/advisories/zdi-10-091/" }, { "trust": 0.3, "url": "http://www.apple.com/safari/" }, { "trust": 0.2, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/webinars/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/40105/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40105" }, { "trust": 0.1, "url": "http://secunia.com/advisories/40105/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/40196/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40196" }, { "trust": 0.1, "url": "http://secunia.com/advisories/40196/" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/disclosure_policy/" }, { "trust": 0.1, "url": "http://twitter.com/thezdi" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1119" }, { "trust": 0.1, "url": "http://www.tippingpoint.com" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com" }, { "trust": 0.1, "url": "http://www.zerodayinitiative.com/advisories/zdi-10-091" } ], "sources": [ { "db": "ZDI", "id": "ZDI-10-091" }, { "db": "VULHUB", "id": "VHN-43724" }, { "db": "BID", "id": "40642" }, { "db": "BID", "id": "40620" }, { "db": "JVNDB", "id": "JVNDB-2010-001548" }, { "db": "PACKETSTORM", "id": "90456" }, { "db": "PACKETSTORM", "id": "91028" }, { "db": "PACKETSTORM", "id": "90403" }, { "db": "CNNVD", "id": "CNNVD-201003-384" }, { "db": "NVD", "id": "CVE-2010-1119" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "ZDI", "id": "ZDI-10-091" }, { "db": "VULHUB", "id": "VHN-43724" }, { "db": "BID", "id": "40642" }, { "db": "BID", "id": "40620" }, { "db": "JVNDB", "id": "JVNDB-2010-001548" }, { "db": "PACKETSTORM", "id": "90456" }, { "db": "PACKETSTORM", "id": "91028" }, { "db": "PACKETSTORM", "id": "90403" }, { "db": "CNNVD", "id": "CNNVD-201003-384" }, { "db": "NVD", "id": "CVE-2010-1119" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-06-08T00:00:00", "db": "ZDI", "id": "ZDI-10-091" }, { "date": "2010-03-25T00:00:00", "db": "VULHUB", "id": "VHN-43724" }, { "date": "2010-06-07T00:00:00", "db": "BID", "id": "40642" }, { "date": "2010-06-07T00:00:00", "db": "BID", "id": "40620" }, { "date": "2010-06-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001548" }, { "date": "2010-06-09T09:04:37", "db": "PACKETSTORM", "id": "90456" }, { "date": "2010-06-25T14:14:55", "db": "PACKETSTORM", "id": "91028" }, { "date": "2010-06-09T00:38:13", "db": "PACKETSTORM", "id": "90403" }, { "date": "2010-03-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201003-384" }, { "date": "2010-03-25T21:00:01.063000", "db": "NVD", "id": "CVE-2010-1119" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2010-06-08T00:00:00", "db": "ZDI", "id": "ZDI-10-091" }, { "date": "2017-09-19T00:00:00", "db": "VULHUB", "id": "VHN-43724" }, { "date": "2011-03-14T18:37:00", "db": "BID", "id": "40642" }, { "date": "2010-06-10T21:19:00", "db": "BID", "id": "40620" }, { "date": "2010-07-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2010-001548" }, { "date": "2011-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-201003-384" }, { "date": "2024-11-21T01:13:41.097000", "db": "NVD", "id": "CVE-2010-1119" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "90403" }, { "db": "CNNVD", "id": "CNNVD-201003-384" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple Safari of WebKit Vulnerable to arbitrary code execution", "sources": [ { "db": "JVNDB", "id": "JVNDB-2010-001548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201003-384" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.