CVE-2010-1119
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
25/03/2010
Last modified:
11/04/2025
Description
Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, Safari before 4.1 on Mac OS X 10.4, and Safari on Apple iPhone OS allows remote attackers to execute arbitrary code or cause a denial of service (application crash), or read the SMS database or other data, via vectors related to "attribute manipulation," as demonstrated by Vincenzo Iozzo and Ralf Philipp Weinmann during a Pwn2Own competition at CanSecWest 2010.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* | 4.0.5 (including) | |
cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010
- http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html
- http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
- http://news.cnet.com/8301-27080_3-20001126-245.html
- http://secunia.com/advisories/40105
- http://secunia.com/advisories/40196
- http://securityreason.com/securityalert/8128
- http://securitytracker.com/id?1024067=
- http://support.apple.com/kb/HT4196
- http://support.apple.com/kb/HT4220
- http://support.apple.com/kb/HT4225
- http://twitter.com/thezdi/statuses/11001080021
- http://www.securityfocus.com/bid/40620
- http://www.vupen.com/english/advisories/2010/1373
- http://www.vupen.com/english/advisories/2010/1512
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7037
- http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010
- http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html
- http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html
- http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
- http://news.cnet.com/8301-27080_3-20001126-245.html
- http://secunia.com/advisories/40105
- http://secunia.com/advisories/40196
- http://securityreason.com/securityalert/8128
- http://securitytracker.com/id?1024067=
- http://support.apple.com/kb/HT4196
- http://support.apple.com/kb/HT4220
- http://support.apple.com/kb/HT4225
- http://twitter.com/thezdi/statuses/11001080021
- http://www.securityfocus.com/bid/40620
- http://www.vupen.com/english/advisories/2010/1373
- http://www.vupen.com/english/advisories/2010/1512
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7037